{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:25:28.530","vulnerabilities":[{"cve":{"id":"CVE-2021-32661","sourceIdentifier":"security-advisories@github.com","published":"2021-06-03T18:15:08.800","lastModified":"2024-11-21T06:07:28.877","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Backstage is an open platform for building developer portals. In versions of Backstage's Techdocs Plugin (`@backstage/plugin-techdocs`) prior to 0.9.5, a malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`."},{"lang":"es","value":"Backstage es una plataforma abierta para construir portales para desarrolladores. En las versiones del plugin Techdocs de Backstage (\"@backstage/plugin-techdocs\") anteriores a versión 0.9.5, un actor interno malicioso puede potencialmente cargar contenido de documentación con scripts maliciosos insertando el script dentro de un elemento \"object\". Esto puede dar acceso a datos confidenciales cuando otros usuarios visiten esa misma página de documentación. La capacidad de subir contenido malicioso puede estar limitada por los procesos internos de revisión de código, a menos que el método de despliegue de TechDocs elegido sea usar un almacén de objetos y el actor tenga acceso a subir archivos directamente a ese almacén. La vulnerabilidad está parcheada en la versión \"0.9.5\" de \"@backstage/plugin-techdocs\""}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:N","baseScore":4.9,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:\\@backstage\\/plugin-techdocs:*:*:*:*:*:node.js:*:*","versionEndExcluding":"0.9.5","matchCriteriaId":"867A30F2-E72C-46DD-AA29-0CC18EE8E3AC"}]}]}],"references":[{"url":"https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/backstage/backstage/releases/tag/release-2021-06-03","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/backstage/backstage/releases/tag/release-2021-06-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}