CVE-2026-35171

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema supports the special () key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during application startup. This is a critical remote code execution (RCE) vulnerability caused by unsafe use of logging.config.dictConfig() with user-controlled input. This vulnerability is fixed in 1.3.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:kedro:*:*:*:*:*:python:*:*

History

14 Apr 2026, 15:36

Type Values Removed Values Added
CPE cpe:2.3:a:linuxfoundation:kedro:*:*:*:*:*:python:*:*
First Time Linuxfoundation
Linuxfoundation kedro
References () https://github.com/kedro-org/kedro/security/advisories/GHSA-9cqf-439c-j96r - () https://github.com/kedro-org/kedro/security/advisories/GHSA-9cqf-439c-j96r - Vendor Advisory

06 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 18:16

Updated : 2026-04-14 15:36


NVD link : CVE-2026-35171

Mitre link : CVE-2026-35171

CVE.ORG link : CVE-2026-35171


JSON object : View

Products Affected

linuxfoundation

  • kedro
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-502

Deserialization of Untrusted Data