Cyber Posture

CVE-2026-32236

High

Published: 12 March 2026

Published
12 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 13.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32236 is a high-severity SSRF (CWE-918) vulnerability in Linuxfoundation Backstage. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-918

Penetration testing attempts server-side requests to internal resources, identifying SSRF weaknesses for remediation.

addresses: CWE-918

Outbound connections to external resources can be monitored and limited at the boundary, reducing SSRF impact.

addresses: CWE-918

Validates server-side URLs and resource references to block SSRF attempts.

addresses: CWE-918

Detects server-side request forgery through monitoring of unexpected outbound connections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Why these techniques?

SSRF vuln in public-facing Backstage auth plugin directly matches T1190 exploitation; limited internal endpoint probing enables network service discovery (T1046) for reconnaissance.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Backstage is an open framework for building developer portals. Prior to 0.27.1, a Server-Side Request Forgery (SSRF) vulnerability exists in @backstage/plugin-auth-backend when auth.experimentalClientIdMetadataDocuments.enabled is set to true. The CIMD metadata fetch validates the initial client_id hostname against private IP ranges…

more

but does not apply the same validation after HTTP redirects. The practical impact is limited. The attacker cannot read the response body from the internal request, cannot control request headers or method, and the feature must be explicitly enabled via an experimental flag that is off by default. Deployments that restrict allowedClientIdPatterns to specific trusted domains are not affected. Patched in @backstage/plugin-auth-backend version 0.27.1.

Deeper analysisAI

CVE-2026-32236 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, affecting the @backstage/plugin-auth-backend component of Backstage, an open framework for building developer portals. The issue exists in versions prior to 0.27.1 when the experimental configuration auth.experimentalClientIdMetadataDocuments.enabled is set to true. During Client ID Metadata Document (CIMD) metadata fetches, the plugin validates the initial client_id hostname against private IP ranges but fails to apply the same checks after HTTP redirects, with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Any network-accessible attacker can exploit this vulnerability without authentication or user interaction by triggering a CIMD metadata fetch with a malicious client_id that redirects to internal resources. While the attacker cannot read the response body of the internal request, cannot control request headers or method, and the feature requires explicit enabling via an off-by-default experimental flag, successful exploitation enables the server to connect to unintended internal endpoints, potentially leading to high confidentiality impacts such as network reconnaissance.

The vulnerability is patched in @backstage/plugin-auth-backend version 0.27.1, as detailed in the GitHub security advisory GHSA-qp4c-xg64-7c6x and the fixing commit 17038abf2dfdb4abc08a59b1c95af39851de0e07. Deployments that restrict allowedClientIdPatterns to specific trusted domains are unaffected, providing a key mitigation for those not yet upgraded.

Details

CWE(s)

Affected Products

linuxfoundation
backstage
≤ 0.27.0

CVEs Like This One

CVE-2026-25153Same product: Linuxfoundation Backstage
CVE-2025-61916Same vendor: Linuxfoundation
CVE-2026-0686Shared CWE-918
CVE-2025-1849Shared CWE-918
CVE-2025-1848Shared CWE-918
CVE-2026-24124Same vendor: Linuxfoundation
CVE-2026-4528Shared CWE-918
CVE-2025-27777Shared CWE-918
CVE-2026-40242Shared CWE-918
CVE-2026-33701Same vendor: Linuxfoundation

References