CVE-2026-27965
Published: 26 February 2026
Summary
CVE-2026-27965 is a critical-severity OS Command Injection (CWE-78) vulnerability in Linuxfoundation Vitess. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by requiring timely application of Vitess patches 23.0.3 or 22.0.4 that prevent execution of arbitrary commands from tampered backup manifest files.
Enforces approved authorizations to restrict read/write access to backup storage locations like S3 buckets, preventing attackers from manipulating manifest files.
Implements integrity verification mechanisms to detect tampering of backup manifest files and prevent execution of injected commands during restoration.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in backup manifest handling enables remote code execution on Vitess nodes via network-accessible storage tampering (T1190) and direct Unix shell command execution during restore (T1059.004).
NVD Description
Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is…
more
later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. Some workarounds are available. Those who intended to use an external decompressor then can always specify that decompressor command in the `--external-decompressor` flag value for `vttablet` and `vtbackup`. That then overrides any value specified in the manifest file. Those who did not intend to use an external decompressor, nor an internal one, can specify a value such as `cat` or `tee` in the `--external-decompressor` flag value for `vttablet` and `vtbackup` to ensure that a harmless command is always used.
Deeper analysisAI
CVE-2026-27965 is a high-severity vulnerability (CVSS 9.9) in Vitess, a database clustering system for horizontal scaling of MySQL. In versions prior to 23.0.3 and 22.0.4, the issue stems from improper handling of backup manifest files stored in external locations such as S3 buckets. Attackers with read/write access to these backup storage locations can modify the manifest files to inject arbitrary commands, which are then executed during the backup restoration process. This flaw is classified under CWE-78 (OS Command Injection).
An attacker requires only low privileges with read/write access to the backup storage, enabling exploitation over the network with low complexity and no user interaction. Upon restoration of the tampered backup, the injected code executes with the privileges of the Vitess processes (vttablet or vtbackup), granting unauthorized access to the production deployment environment. This allows the attacker to access sensitive information available in that environment and execute additional arbitrary commands, potentially leading to full compromise.
Vitess versions 23.0.3 and 22.0.4 include patches addressing the vulnerability, as detailed in the project's security advisory (GHSA-8g8j-r87h-p36x) and related GitHub commits and pull requests. Workarounds involve explicitly setting the `--external-decompressor` flag for vttablet and vtbackup to override any decompressor command in the manifest file; users intending to use an external decompressor should specify it directly, while others can use a harmless command like `cat` or `tee`.
Details
- CWE(s)