The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Injection vulnerabilities in an interactive lesson.
Start learningUpgrade @backstage/plugin-techdocs-node to version 1.13.11, 1.14.1 or higher.
@backstage/plugin-techdocs-node is a Common node.js functionalities for TechDocs, to be shared between techdocs-backend plugin and techdocs-cli
Affected versions of this package are vulnerable to Arbitrary Code Injection via the processing of MkDocs hooks, when TechDocs is configured with runIn: local. An attacker who can submit or modify a repository's mkdocs.yml file can execute arbitrary Python code on the TechDocs build server via MkDocs hooks configuration.
If you cannot upgrade immediately:
runIn: docker instead of runIn: local. This provides container isolation, though it does not fully mitigate the risk.mkdocs.yml files in repositories that TechDocs processes. Only allow trusted contributors.mkdocs.yml files to detect malicious hooks configurations before they are merged.1.4.0 (e.g., 1.3.1) which does not support hooks. Note: This may limit access to newer MkDocs features.