CVE-2026-24048

Backstage Pass: Bypassing SSRF Protections via Redirect Hijacking

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 22, 2026·7 min read·3 visits

Executive Summary (TL;DR)

The Backstage backend checked the invite list at the front door but didn't watch where the guests went after they got in. By providing a URL hosted on an allowed domain (like GitHub) that returns a 302 redirect, an attacker could force the server to fetch internal resources (like AWS metadata or local services), completely bypassing the `backend.reading.allow` security controls.

A logic flaw in the Backstage `FetchUrlReader` component allowed attackers to bypass URL allowlists by utilizing HTTP redirects. While the initial URL was validated against the configuration, the underlying HTTP client followed 3xx redirects blindly, allowing access to internal network resources.

Fix Analysis (1)

Technical Appendix

CVSS Score
3.5/ 10
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
EPSS Probability
0.05%
Top 100% most exploited
5,000
via Shodan

Affected Systems

Backstage Backend@backstage/backend-defaults packageBackstage Scaffolder PluginBackstage Catalog Plugin

Affected Versions Detail

Product
Affected Versions
Fixed Version
@backstage/backend-defaults
Backstage
< 0.12.20.12.2
AttributeDetail
CWE IDCWE-918
Attack VectorNetwork (Redirect Hijack)
CVSS3.5 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N)
ImpactInformation Disclosure / Internal Network Access
Exploit StatusPoC Available
Patch StatusAvailable (0.12.2+)
CWE-918
Server-Side Request Forgery (SSRF)

The application does not validate the destination IP address of an HTTP redirect, allowing an attacker to force the application to send requests to an arbitrary destination.

Vulnerability Timeline

Vulnerability Disclosed to Maintainers
2026-01-10
Patch Developed (Commit 27f9061d)
2026-01-15
Advisory Published
2026-02-01

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.