CVE-2026-29082

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious HTML/JavaScript into Kestra's execution-file preview feature, leading to cross-site scripting (XSS) attacks. Users of Kestra versions 1.1.10 and earlier are affected when they view execution files containing malicious Markdown content. The vulnerability exists because user-supplied Markdown is rendered without proper HTML sanitization.

💻 Affected Systems

Products:
  • Kestra
Versions: 1.1.10 and prior versions
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the execution-file preview feature when rendering Markdown files. Requires users to view malicious execution files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary JavaScript in victims' browsers, potentially stealing session cookies, performing actions as authenticated users, or redirecting to malicious sites.

🟠

Likely Case

Attackers with access to create or modify execution files could embed malicious scripts that execute when other users view those files, leading to session hijacking or credential theft.

🟢

If Mitigated

With proper input validation and output encoding, the risk is limited to benign Markdown rendering without script execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to create or modify execution files with malicious Markdown content, and victims must view those files through the vulnerable preview feature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://github.com/kestra-io/kestra/security/advisories/GHSA-r36c-83hm-pc8j

Restart Required: Yes

Instructions:

No official patch available. Monitor Kestra releases for security updates and apply immediately when available.

🔧 Temporary Workarounds

Disable Markdown preview

all

Disable or restrict access to the execution-file preview feature that renders Markdown files.

Implement input validation

all

Add server-side validation to sanitize or reject Markdown content containing script tags and dangerous HTML elements.

🧯 If You Can't Patch

  • Restrict user permissions to create or modify execution files containing Markdown content
  • Implement web application firewall (WAF) rules to detect and block XSS payloads in Markdown content

🔍 How to Verify

Check if Vulnerable:

Check if running Kestra version 1.1.10 or earlier and if execution-file preview feature is enabled.

Check Version:

Check Kestra server logs or configuration files for version information

Verify Fix Applied:

When patch becomes available, verify version is updated beyond 1.1.10 and test that Markdown preview no longer executes JavaScript.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Markdown content in execution files, especially containing script tags or JavaScript

Network Indicators:

  • Unexpected outbound connections from user browsers after viewing execution files

SIEM Query:

Search for execution file access logs containing suspicious patterns like <script> tags or javascript: URIs

🔗 References

📤 Share & Export