[go: up one dir, main page]

Symlink Attack Affecting @backstage/plugin-scaffolder-backend package, versions <2.2.2>=3.0.0-next.0 <3.0.2>=3.1.0-next.0 <3.1.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Symlink Attack vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-BACKSTAGEPLUGINSCAFFOLDERBACKEND-15054277
  • published22 Jan 2026
  • disclosed21 Jan 2026
  • creditUnknown

Introduced: 21 Jan 2026

NewCVE-2026-24046  (opens in a new tab)
CWE-22  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade @backstage/plugin-scaffolder-backend to version 2.2.2, 3.0.2, 3.1.1 or higher.

Overview

@backstage/plugin-scaffolder-backend is a The Backstage backend plugin that helps you create new things

Affected versions of this package are vulnerable to Symlink Attack via multiple actions, including debug:log, fs:delete, and archive extraction. A user who create and execute Scaffolder templates can read, delete, or write arbitrary files outside the intended workspace.

Workaround

This vulnerability can be mitigated by limiting access to template creation and updates, restricting who can execute Scaffolder templates via the permissions framework, auditing existing templates for symlink usage, and running the application in a containerized environment with restricted filesystem access.

CVSS Base Scores

version 4.0
version 3.1