Description
Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true and injects the resulting HTML with Vue’s v-html without sanitisation. At time of publication, there are no publicly available patches.
Published: 2026-03-06
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Monitor
AI Analysis

Impact

In Kestra versions 1.1.10 and older, the system renders user‑supplied Markdown files with the markdown‑it library configured as html:true. The resulting HTML is then injected directly into the page via Vue’s v‑html directive without any sanitization. This allows an attacker who can supply a Markdown file to embed arbitrary HTML and JavaScript. When a victim opens the preview of the malicious file, the script runs in their browser, enabling session hijacking, defacement, or further malicious activity consistent with a stored cross‑site scripting vulnerability (CWE‑79).

Affected Systems

The affected product is Kestra ‑ an event‑driven orchestration platform made by kestra‑io:kestra. All releases from 1.1.10 down to the earliest available are susceptible. No patched version exists at the time of publication; the advisory itself notes that a public fix has not yet been released.

Risk and Exploitability

The CVSS score is 7.3, indicating high severity, while the EPSS score is less than 1%. The vulnerability is not listed in the CISA KEV catalog. The attack vector is likely local or requires the attacker to supply a Markdown file that an end‑user will preview. Once the file is previewed, the malicious code executes in the context of the victim’s browser. Because the flaw is stored, any user who opens the file—regardless of their authentication level—can be affected. No additional exploitation prerequisites are detailed in the advisory, suggesting that the vulnerability is broadly exploitable within the user base that interacts with Markdown previews.

Generated by OpenCVE AI on April 16, 2026 at 11:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict or disable direct Markdown preview until a safe configuration can be applied
  • Configure markdown‑it with html:false or process all rendered HTML through a trusted sanitizer before it is injected via v‑html
  • Monitor the vendor’s security advisories for a patched release; when available, upgrade Kestra to the fixed version or apply the official patch

Generated by OpenCVE AI on April 16, 2026 at 11:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Kestra
Kestra kestra
CPEs cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:*
Vendors & Products Kestra
Kestra kestra

Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Kestra-io
Kestra-io kestra
Vendors & Products Kestra-io
Kestra-io kestra

Fri, 06 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true and injects the resulting HTML with Vue’s v-html without sanitisation. At time of publication, there are no publicly available patches.
Title Kestra: Stored Cross-Site Scripting in Markdown File Preview
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T14:59:32.254Z

Reserved: 2026-03-03T20:51:43.483Z

Link: CVE-2026-29082

cve-icon Vulnrichment

Updated: 2026-03-09T14:59:18.883Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T17:16:34.347

Modified: 2026-03-10T21:00:33.473

Link: CVE-2026-29082

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:30:15Z

Weaknesses