Description

Karapace is an open-source implementation of Kafka REST and Schema Registry. Prior to version 6.0.0, there is a Path Traversal vulnerability in the backup reader (backup/backends/v3/backend.py). If a malicious backup file is provided to Karapace, an attacker may exploit insufficient path validation to perform arbitrary file read on the system where Karapace is running. The issue affects deployments that use the backup/restore functionality and process backups from untrusted sources. The impact depends on the file system permissions of the Karapace process. This issue has been patched in version 6.0.0.

INFO

Published Date :

2026-03-07T15:16:15.148Z

Last Modified :

2026-03-09T18:27:12.083Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-29190 vulnerability.

Vendors Products
Aiven
  • Karapace
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-29190.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact