Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.4

Kestra Execution-File Preview Allows Malicious HTML Injection

CVE-2026-29082
Summary

Users of Kestra versions 1.1.10 and earlier may be at risk of having malicious HTML injected into the execution-file preview through user-supplied Markdown content. If exploited, this could potentially allow an attacker to execute arbitrary code or manipulate the user interface. Until a patch is released, we recommend that users avoid using the execution-file preview feature until a fix is available.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
kestra kestra <= 1.1.10
Original title
Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true ...
Original description
Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true and injects the resulting HTML with Vue’s v-html without sanitisation. At time of publication, there are no publicly available patches.
nvd CVSS3.1 7.3
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 6 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026