Unrated severityNVD Advisory· Published Mar 7, 2026· Updated Mar 9, 2026
Karapace: Path Traversal in Backup Reader
CVE-2026-29190
Description
Karapace is an open-source implementation of Kafka REST and Schema Registry. Prior to version 6.0.0, there is a Path Traversal vulnerability in the backup reader (backup/backends/v3/backend.py). If a malicious backup file is provided to Karapace, an attacker may exploit insufficient path validation to perform arbitrary file read on the system where Karapace is running. The issue affects deployments that use the backup/restore functionality and process backups from untrusted sources. The impact depends on the file system permissions of the Karapace process. This issue has been patched in version 6.0.0.
Affected products
2- Range: <6.0.0
- Aiven-Open/karapacev5Range: < 6.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/Aiven-Open/karapace/releases/tag/6.0.0mitrex_refsource_MISC
- github.com/Aiven-Open/karapace/security/advisories/GHSA-rw4j-p3jg-4fxqmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.