Impact
Kestra allows a malicious attacker who is already authenticated to inject an arbitrary SQL payload into the "GET /api/v1/main/flows/search" endpoint. The backend executes this payload via PostgreSQL's COPY … TO PROGRAM clause, which runs arbitrary OS commands on the host. The result is full remote code execution, giving an attacker the same privileges as the process running the Kestra service.
Affected Systems
The vulnerability exists in all releases of the Kestra event‑driven orchestration platform prior to version 1.3.7, specifically the default Docker‑compose deployment. The affected product is Kestra.io’s Kestra server. Upgrading to v1.3.7 or later eliminates the flaw.
Risk and Exploitability
With a CVSS score of 10, the issue is considered critical. Exploitation requires a legitimate authentication token and crafted URL, making it an authenticated remote exploit. The EPSS score is below 1 %, indicating low observed exploitation likelihood, and the vulnerability is not listed in CISA’s KEV catalog. Nonetheless, the high severity combined with the possibility of arbitrary code execution warrants urgent action.
OpenCVE Enrichment