CVE-2026-33664

Kestra is an open-source, event-driven orchestration platform Versions up to and including 1.3.3 render user-supplied flow YAML metadata fields — description, inputs[].displayName, inputs[].description — through the Markdown.vue component instantiated with html: true. The resulting HTML is injected into the DOM via Vue's v-html without any sanitization. This allows a flow author to embed arbitrary JavaScript that executes in the browser of any user who views or interacts with the flow. This is distinct from GHSA-r36c-83hm-pc8j / CVE-2026-29082, which covers only FilePreview.vue rendering .md files from execution outputs. The present finding affects different components, different data sources, and requires significantly less user interaction (zero-click for input.displayName). As of time of publication, it is unclear if a patch is available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:*

History

31 Mar 2026, 01:48

Type Values Removed Values Added
CPE cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:*
References () https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp - () https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp - Exploit, Mitigation, Vendor Advisory
First Time Kestra
Kestra kestra

Information

Published : 2026-03-26 22:16

Updated : 2026-03-31 01:48


NVD link : CVE-2026-33664

Mitre link : CVE-2026-33664

CVE.ORG link : CVE-2026-33664


JSON object : View

Products Affected

kestra

  • kestra
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')