Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33664: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kestra-io kestra

0
High
VulnerabilityCVE-2026-33664cvecve-2026-33664cwe-79
Published: Thu Mar 26 2026 (03/26/2026, 21:13:12 UTC)
Source: CVE Database V5
Vendor/Project: kestra-io
Product: kestra

Description

CVE-2026-33664 is a high-severity cross-site scripting (XSS) vulnerability in Kestra, an open-source event-driven orchestration platform, affecting versions up to and including 1. 3. 3. The vulnerability arises because user-supplied YAML metadata fields such as description and inputs[]. displayName are rendered via a Markdown. vue component with HTML enabled and injected into the DOM using Vue's v-html directive without sanitization. This allows an attacker with contributor-level privileges to embed arbitrary JavaScript that executes in the browsers of users viewing or interacting with the affected flows, potentially compromising confidentiality and integrity. Unlike a related CVE-2026-29082, this flaw requires less user interaction and affects different components and data sources. No patch is currently known to be available. The CVSS score is 7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 21:45:29 UTC

Technical Analysis

CVE-2026-33664 is a cross-site scripting vulnerability identified in Kestra versions up to 1.3.3, an open-source orchestration platform. The root cause is improper neutralization of user input during web page generation, specifically in the rendering of flow YAML metadata fields such as description, inputs[].displayName, and inputs[].description. These fields are processed by the Markdown.vue component with the html option enabled, and the resulting HTML is injected directly into the DOM using Vue.js's v-html directive without any sanitization or escaping. This design flaw enables a flow author with write access to embed arbitrary JavaScript code within these metadata fields. When other users view or interact with the affected flows, the malicious script executes in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions within the Kestra web interface. This vulnerability differs from CVE-2026-29082, which involves rendering markdown files from execution outputs and requires more user interaction. Here, the exploitation requires minimal user interaction (zero-click for inputs[].displayName). The vulnerability has a CVSS 3.1 score of 7.3, indicating high severity due to network attack vector, low complexity, and significant impact on confidentiality and integrity. No official patch or fix is currently available, increasing the urgency for mitigation. The flaw affects all deployments running Kestra versions 1.3.3 or earlier, especially those allowing multiple users to author or modify flows.

Potential Impact

The impact of CVE-2026-33664 is significant for organizations using Kestra as it enables attackers with contributor privileges to execute arbitrary JavaScript in the browsers of other users. This can lead to theft of session tokens, unauthorized actions within the Kestra platform, data leakage, and potential lateral movement within the environment. Since Kestra is used for orchestration and automation, compromise could disrupt critical workflows or expose sensitive operational data. The vulnerability affects confidentiality and integrity but not availability directly. The ease of exploitation (low complexity) combined with the ability to execute code without user interaction increases risk. Organizations with multi-tenant or collaborative Kestra environments are particularly vulnerable. The lack of a patch means the window of exposure remains open, potentially inviting targeted attacks or exploitation in the wild. This could impact sectors relying on Kestra for automation, including technology, finance, and cloud service providers.

Mitigation Recommendations

To mitigate CVE-2026-33664, organizations should immediately restrict flow authoring permissions to trusted users only, minimizing the risk of malicious metadata injection. Implement strict code review and validation processes for all flow YAML metadata before deployment. Disable or avoid enabling the html option in Markdown.vue rendering if possible, or modify the source code to sanitize or escape user-supplied input before rendering. Employ Content Security Policy (CSP) headers to limit the impact of injected scripts. Monitor Kestra logs and user activity for unusual behavior indicative of exploitation attempts. Consider isolating Kestra instances or restricting access to trusted networks. Stay alert for official patches or updates from the Kestra project and apply them promptly once available. If feasible, temporarily downgrade user interface privileges or disable web UI features that render user-supplied metadata until a fix is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T15:23:42.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5a54b3c064ed76fcfc82d

Added to database: 3/26/2026, 9:29:47 PM

Last enriched: 3/26/2026, 9:45:29 PM

Last updated: 3/27/2026, 5:26:51 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses