CVE-2026-33664

Kestra is an open-source, event-driven orchestration platform Versions up to and including 1.3.3 render user-supplied flow YAML metadata fields — description, inputs[].displayName, inputs[].description — through the Markdown.vue component instantiated with html: true. The resulting HTML is injected into the DOM via Vue's v-html without any sanitization. This allows a flow author to embed arbitrary JavaScript that executes in the browser of any user who views or interacts with the flow. This is distinct from GHSA-r36c-83hm-pc8j / CVE-2026-29082, which covers only FilePreview.vue rendering .md files from execution outputs. The present finding affects different components, different data sources, and requires significantly less user interaction (zero-click for input.displayName). As of time of publication, it is unclear if a patch is available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:*

History

31 Mar 2026, 01:48

Type Values Removed Values Added
CPE cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:*
References () https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp - () https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp - Exploit, Mitigation, Vendor Advisory
First Time Kestra kestra
Kestra

27 Mar 2026, 15:16

Type Values Removed Values Added
Summary
  • (es) Kestra es una plataforma de orquestación de código abierto impulsada por eventos. Las versiones hasta la 1.3.3 inclusive renderizan los campos de metadatos YAML de flujo proporcionados por el usuario — description, inputs[].displayName, inputs[].description — a través del componente Markdown.vue instanciado con html: true. El HTML resultante se inyecta en el DOM a través de v-html de Vue sin ninguna sanitización. Esto permite a un autor de flujo incrustar JavaScript arbitrario que se ejecuta en el navegador de cualquier usuario que vea o interactúe con el flujo. Esto es distinto de GHSA-r36c-83hm-pc8j / CVE-2026-29082, que cubre solo la renderización de archivos .md por FilePreview.vue a partir de las salidas de ejecución. El hallazgo actual afecta a diferentes componentes, diferentes fuentes de datos y requiere significativamente menos interacción del usuario (cero clics para input.displayName). Al momento de la publicación, no está claro si hay un parche disponible.
References () https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp - () https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp -

26 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 22:16

Updated : 2026-03-31 01:48


NVD link : CVE-2026-33664

Mitre link : CVE-2026-33664

CVE.ORG link : CVE-2026-33664


JSON object : View

Products Affected

kestra

  • kestra
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')