Kestra is an open-source, event-driven orchestration platform Versions up to and including 1.3.3 render user-supplied flow YAML metadata fields — description, inputs[].displayName, inputs[].description — through the Markdown.vue component instantiated with html: true. The resulting HTML is injected into the DOM via Vue's v-html without any sanitization. This allows a flow author to embed arbitrary JavaScript that executes in the browser of any user who views or interacts with the flow. This is distinct from GHSA-r36c-83hm-pc8j / CVE-2026-29082, which covers only FilePreview.vue rendering .md files from execution outputs. The present finding affects different components, different data sources, and requires significantly less user interaction (zero-click for input.displayName). As of time of publication, it is unclear if a patch is available.
References
| Link | Resource |
|---|---|
| https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp | Exploit Mitigation Vendor Advisory |
| https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp | Exploit Mitigation Vendor Advisory |
Configurations
History
31 Mar 2026, 01:48
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:* | |
| References | () https://github.com/kestra-io/kestra/security/advisories/GHSA-v2mc-8q95-g7hp - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Kestra
Kestra kestra |
Information
Published : 2026-03-26 22:16
Updated : 2026-03-31 01:48
NVD link : CVE-2026-33664
Mitre link : CVE-2026-33664
CVE.ORG link : CVE-2026-33664
JSON object : View
Products Affected
kestra
- kestra
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
