Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true and injects the resulting HTML with Vue’s v-html without sanitisation. At time of publication, there are no publicly available patches.
References
| Link | Resource |
|---|---|
| https://github.com/kestra-io/kestra/releases/tag/v1.0.30 | Product Release Notes |
| https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j | Exploit Vendor Advisory |
| https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j | Exploit Vendor Advisory |
Configurations
History
10 Mar 2026, 21:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/kestra-io/kestra/releases/tag/v1.0.30 - Product, Release Notes | |
| References | () https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j - Exploit, Vendor Advisory | |
| First Time |
Kestra kestra
Kestra |
|
| CPE | cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:* | |
| Summary |
|
09 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j - |
06 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 17:16
Updated : 2026-03-10 21:00
NVD link : CVE-2026-29082
Mitre link : CVE-2026-29082
CVE.ORG link : CVE-2026-29082
JSON object : View
Products Affected
kestra
- kestra
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
