Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema supports the special () key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during application startup. This is a critical remote code execution (RCE) vulnerability caused by unsafe use of logging.config.dictConfig() with user-controlled input. This vulnerability is fixed in 1.3.0.
References
| Link | Resource |
|---|---|
| https://github.com/kedro-org/kedro/security/advisories/GHSA-9cqf-439c-j96r | Vendor Advisory |
Configurations
History
14 Apr 2026, 15:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:linuxfoundation:kedro:*:*:*:*:*:python:*:* | |
| First Time |
Linuxfoundation
Linuxfoundation kedro |
|
| References | () https://github.com/kedro-org/kedro/security/advisories/GHSA-9cqf-439c-j96r - Vendor Advisory |
06 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 18:16
Updated : 2026-04-14 15:36
NVD link : CVE-2026-35171
Mitre link : CVE-2026-35171
CVE.ORG link : CVE-2026-35171
JSON object : View
Products Affected
linuxfoundation
- kedro
