CVE-2026-29190

4.1 MEDIUM
Published: March 07, 2026 Modified: March 11, 2026
View on NVD

Description

Karapace is an open-source implementation of Kafka REST and Schema Registry. Prior to version 6.0.0, there is a Path Traversal vulnerability in the backup reader (backup/backends/v3/backend.py). If a malicious backup file is provided to Karapace, an attacker may exploit insufficient path validation to perform arbitrary file read on the system where Karapace is running. The issue affects deployments that use the backup/restore functionality and process backups from untrusted sources. The impact depends on the file system permissions of the Karapace process. This issue has been patched in version 6.0.0.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/Aiven-Open/karapace/releases/tag/6.0.0
Source: security-advisories@github.com
Product Release Notes
https://github.com/Aiven-Open/karapace/security/advisories/GHSA-rw4j-p3jg-4fxq
Source: security-advisories@github.com
Mitigation Vendor Advisory

2 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.1 / 10.0
EPSS (Exploit Probability)
0.1%
26th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

aiven