CVE-2026-29190

Karapace is an open-source implementation of Kafka REST and Schema Registry. Prior to version 6.0.0, there is a Path Traversal vulnerability in the backup reader (backup/backends/v3/backend.py). If a malicious backup file is provided to Karapace, an attacker may exploit insufficient path validation to perform arbitrary file read on the system where Karapace is running. The issue affects deployments that use the backup/restore functionality and process backups from untrusted sources. The impact depends on the file system permissions of the Karapace process. This issue has been patched in version 6.0.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:aiven:karapace:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-07 16:15

Updated : 2026-03-11 16:48


NVD link : CVE-2026-29190

Mitre link : CVE-2026-29190

CVE.ORG link : CVE-2026-29190


JSON object : View

Products Affected

aiven

  • karapace
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')