@backstage/plugin-auth-backend: OAuth redirect URI allowlist bypass
Moderate severity
GitHub Reviewed
Published
Mar 11, 2026
in
backstage/backstage
•
Updated Mar 13, 2026
Description
Published to the GitHub Advisory Database
Mar 12, 2026
Reviewed
Mar 12, 2026
Published by the National Vulnerability Database
Mar 12, 2026
Last updated
Mar 13, 2026
Impact
The experimental OIDC provider in
@backstage/plugin-auth-backendis vulnerable to a redirect URI allowlist bypass. Instances that have enabled experimental Dynamic Client Registration or Client ID Metadata Documents and configuredallowedRedirectUriPatternsare affected.A specially crafted redirect URI can pass the allowlist validation while resolving to an attacker-controlled host. If a victim approves the resulting OAuth consent request, their authorization code is sent to the attacker, who can exchange it for a valid access token.
This requires victim interaction and that one of the experimental features is explicitly enabled, which is not the default.
Patches
Upgrade to
@backstage/plugin-auth-backendversion 0.27.1 or later.Workarounds
Disable experimental Dynamic Client Registration and Client ID Metadata Documents features if they are not required.
References
References