Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20.
CVSS
No CVSS.
References
Configurations
No configuration.
History
06 Mar 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 07:16
Updated : 2026-03-06 07:16
NVD link : CVE-2026-29042
Mitre link : CVE-2026-29042
CVE.ORG link : CVE-2026-29042
JSON object : View
Products Affected
No product.
CWE
CWE-75
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
