Description
Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20.
Published: 2026-03-06
Score: 8.9 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Shell Runtime component of Nuclio accepts a custom HTTP header, X‐Nuclio‐Arguments, which is directly concatenated into shell commands without sanitization. This omission allows an attacker who can send an HTTP request to the function endpoint to inject arbitrary shell instructions, thereby achieving remote code execution and potentially escalating privileges on the host that runs the Nuclio server. The vulnerability is an instance of command injection originating from insecure handling of user input.

Affected Systems

Nuclio, Version 1.15.20 introduced the fix. All versions of Nuclio older than 1.15.20 are affected. The flaw exists within the Nuclio Shell Runtime component that processes HTTP requests to user‑defined serverless functions. Vendors or users deploying versions older than 1.15.20 in any environment—including Kubernetes, Docker, or bare‑metal installations—are susceptible to exploitation.

Risk and Exploitability

The CVSS score of 8.9 indicates a high severity with potential for complete system compromise. The EPSS value of less than 1 % suggests that, although the flaw is severe, its exploitation frequency remains low, possibly due to a limited attack surface. Nuclio does not list this vulnerability in the CISA KEV catalog, but the lack of exposure does not reduce the risk for an attacker who can reach the vulnerable HTTP endpoint. Exploitation requires the ability to send crafted HTTP requests to a function; normally the X‑Nuclio‑Arguments header can be controlled by an authenticated or unauthenticated user depending on the function’s access settings, implying that privilege escalation is possible if the function runs with elevated rights.

Generated by OpenCVE AI on April 16, 2026 at 11:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy Nuclio 1.15.20 or later, which removes the unsanitized concatenation of the X‑Nuclio‑Arguments header into shell commands.
  • Re‑evaluate any functions that currently use the Shell Runtime or accept the X‑Nuclio‑Arguments header, ensuring they are protected by proper authentication and authorization or refactored to eliminate the insecure input handling.
  • If an upgrade cannot be performed immediately, restrict the exposure of the affected functions to trusted sources only, block the X‑Nuclio‑Arguments header for unauthenticated requests, or disable the Shell Runtime component entirely.

Generated by OpenCVE AI on April 16, 2026 at 11:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-95fj-3w7g-4r27 Nuclio Shell Runtime Command Injection Leading to Privilege Escalation
History

Tue, 10 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Iguazio
Iguazio nuclio
CPEs cpe:2.3:a:iguazio:nuclio:*:*:*:*:*:*:*:*
Vendors & Products Iguazio
Iguazio nuclio
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Nuclio
Nuclio nuclio
Vendors & Products Nuclio
Nuclio nuclio

Fri, 06 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
Description Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20.
Title Nuclio Shell Runtime Command Injection Leading to Privilege Escalation
Weaknesses CWE-75
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T19:57:06.516Z

Reserved: 2026-03-03T17:50:11.242Z

Link: CVE-2026-29042

cve-icon Vulnrichment

Updated: 2026-03-09T19:57:01.432Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T07:16:01.743

Modified: 2026-03-10T19:32:49.967

Link: CVE-2026-29042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:30:15Z

Weaknesses