CVE-2025-32791

4.3 MEDIUM

📋 TL;DR

This vulnerability in Backstage's permission plugin backend allows attackers to extract information from conditional decisions returned by permission policies. Only systems using Backstage's permission system with conditional decisions are affected. The impact is limited to information disclosure about permission logic.

💻 Affected Systems

Products:
  • Backstage Scaffolder plugin
  • Backstage permission plugin backend
Versions: Versions before 0.6.0 of the permissions backend
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when permission system is enabled AND using conditional decisions in permission policies

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive information about permission policy logic and conditional decision structures could be exposed, potentially revealing security control details.

🟠

Likely Case

Limited information disclosure about permission decision structures without exposing actual sensitive data or credentials.

🟢

If Mitigated

No impact if permission system is not used or conditional decisions don't contain sensitive information.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires understanding of Backstage permission system and API access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.6.0 of the permissions backend

Vendor Advisory: https://github.com/backstage/backstage/security/advisories/GHSA-f8j4-p5cr-p777

Restart Required: Yes

Instructions:

1. Update Backstage permissions backend to version 0.6.0 or later. 2. Update package.json dependencies. 3. Run npm/yarn install. 4. Restart Backstage services.

🔧 Temporary Workarounds

Secure Conditional Decisions

all

Ensure permission policies are crafted so conditional decisions don't contain sensitive information

🧯 If You Can't Patch

  • Disable permission system if not required
  • Review and sanitize all conditional decision logic in permission policies

🔍 How to Verify

Check if Vulnerable:

Check if using Backstage permission system with version <0.6.0 and conditional decisions in policies

Check Version:

npm list @backstage/plugin-permission-backend

Verify Fix Applied:

Verify permissions backend version is >=0.6.0 and test permission API responses

📡 Detection & Monitoring

Log Indicators:

  • Unusual permission API calls
  • Multiple conditional decision queries

Network Indicators:

  • Increased traffic to permission backend endpoints

SIEM Query:

source="backstage" AND (endpoint="/permission" OR endpoint="/api/permission") AND status=200

🔗 References

📤 Share & Export