CVE-2026-29082

Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true and injects the resulting HTML with Vue’s v-html without sanitisation. At time of publication, there are no publicly available patches.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:*

History

10 Mar 2026, 21:00

Type Values Removed Values Added
References () https://github.com/kestra-io/kestra/releases/tag/v1.0.30 - () https://github.com/kestra-io/kestra/releases/tag/v1.0.30 - Product, Release Notes
References () https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j - () https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j - Exploit, Vendor Advisory
First Time Kestra kestra
Kestra
CPE cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:*
Summary
  • (es) Kestra es una plataforma de orquestación basada en eventos. En versiones desde la 1.1.10 y anteriores, la vista previa de archivos de ejecución de Kestra renderiza Markdown (.md) proporcionado por el usuario con markdown-it instanciado como html:true e inyecta el HTML resultante con el v-html de Vue sin sanitización. En el momento de la publicación, no hay parches disponibles públicamente.

09 Mar 2026, 16:16

Type Values Removed Values Added
References () https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j - () https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j -

06 Mar 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-06 17:16

Updated : 2026-03-10 21:00


NVD link : CVE-2026-29082

Mitre link : CVE-2026-29082

CVE.ORG link : CVE-2026-29082


JSON object : View

Products Affected

kestra

  • kestra
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')