CVE-2026-27965
Received Received - Intake
Arbitrary Code Execution via Backup Manifest Manipulation in Vitess

Publication date: 2026-02-26

Last updated on: 2026-03-02

Assigner: GitHub, Inc.

Description
Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment β€” allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. Some workarounds are available. Those who intended to use an external decompressor then can always specify that decompressor command in the `--external-decompressor` flag value for `vttablet` and `vtbackup`. That then overrides any value specified in the manifest file. Those who did not intend to use an external decompressor, nor an internal one, can specify a value such as `cat` or `tee` in the `--external-decompressor` flag value for `vttablet` and `vtbackup` to ensure that a harmless command is always used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-26
Last Modified
2026-03-02
Generated
2026-05-07
AI Q&A
2026-02-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linuxfoundation vitess to 22.0.4 (exc)
linuxfoundation vitess From 23.0.0 (inc) to 23.0.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-27965 is a security vulnerability in Vitess, a database clustering system for MySQL. The issue arises from how Vitess handles decompressor commands stored in backup manifest files during backup restoration. If an attacker has read/write access to the backup storage location (such as an S3 bucket), they can modify the manifest file to inject arbitrary decompressor commands.

When the backup is restored, these malicious commands are executed on the Vitess tablet server as the Vitess user, leading to arbitrary code execution. This can allow the attacker to gain unauthorized access to the production environment and run additional commands.

The vulnerability existed because Vitess would trust and load decompressor commands from the manifest file by default during restore operations. Starting with Vitess version 24, this behavior is disabled by default and must be explicitly enabled with a flag, which is strongly discouraged due to security risks.


How can this vulnerability impact me? :

This vulnerability can have serious impacts if exploited. An attacker with write access to the backup storage can manipulate the backup manifest to execute arbitrary code during backup restoration.

This arbitrary code execution can lead to unauthorized access to the production deployment environment where Vitess is running. The attacker can access sensitive information available in that environment and run any additional commands, potentially compromising the entire system.

Because the attack requires access to the backup storage, the risk is limited to environments where such access is possible. However, the impact on confidentiality, integrity, and availability of the system is high if exploited.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking if your Vitess deployment is using vulnerable versions (prior to 23.0.3 and 22.0.4) and whether the backup restore process is configured to trust decompressor commands from the backup manifest file.

Specifically, you should verify if the Vitess components (such as vttablet or vtbackup) are running with the flag `--external-decompressor-use-manifest` enabled, which allows decompressor commands from the manifest to be executed. This flag is disabled by default in patched versions.

Additionally, inspect the backup storage location (e.g., S3 bucket) for unauthorized modifications to the backup `MANIFEST` files, which could indicate tampering.

Suggested commands to help detect potential exploitation or configuration issues include:

  • Check Vitess version: `vttablet --version` or `vtbackup --version`
  • Check running processes for the presence of the `--external-decompressor-use-manifest` flag: `ps aux | grep vttablet` or `ps aux | grep vtbackup`
  • Inspect backup manifest files for suspicious decompressor commands: `cat <backup-location>/MANIFEST` and look for unexpected or shell commands.
  • Audit backup storage permissions to ensure only authorized users have read/write access.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Vitess to patched versions 23.0.3 or 22.0.4 or later, which contain fixes for this vulnerability.

If upgrading is not immediately possible, apply the following workarounds:

  • Specify an explicit external decompressor command using the `--external-decompressor` flag for `vttablet` and `vtbackup`. This overrides any decompressor command specified in the backup manifest file.
  • If no decompressor is intended, set the `--external-decompressor` flag to a harmless command such as `cat` or `tee` to ensure safe operation.

Avoid enabling the `--external-decompressor-use-manifest` flag, as it re-enables the vulnerable behavior and is strongly discouraged.

Additionally, restrict read/write access to the backup storage location to trusted users only to prevent unauthorized modification of backup manifests.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart