No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 11 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:aiven:karapace:*:*:*:*:*:*:*:* |
Mon, 09 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aiven
Aiven karapace |
|
| Vendors & Products |
Aiven
Aiven karapace |
Sat, 07 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Karapace is an open-source implementation of Kafka REST and Schema Registry. Prior to version 6.0.0, there is a Path Traversal vulnerability in the backup reader (backup/backends/v3/backend.py). If a malicious backup file is provided to Karapace, an attacker may exploit insufficient path validation to perform arbitrary file read on the system where Karapace is running. The issue affects deployments that use the backup/restore functionality and process backups from untrusted sources. The impact depends on the file system permissions of the Karapace process. This issue has been patched in version 6.0.0. | |
| Title | Karapace: Path Traversal in Backup Reader | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T18:27:12.083Z
Reserved: 2026-03-04T14:44:00.714Z
Link: CVE-2026-29190
Updated: 2026-03-09T17:38:58.746Z
Status : Analyzed
Published: 2026-03-07T16:15:54.350
Modified: 2026-03-11T16:48:43.587
Link: CVE-2026-29190
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:05:17Z