Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.4
Kestra Execution-File Preview Allows Malicious HTML Injection
CVE-2026-29082
Summary
Users of Kestra versions 1.1.10 and earlier may be at risk of having malicious HTML injected into the execution-file preview through user-supplied Markdown content. If exploited, this could potentially allow an attacker to execute arbitrary code or manipulate the user interface. Until a patch is released, we recommend that users avoid using the execution-file preview feature until a fix is available.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| kestra | kestra | <= 1.1.10 | – |
Original title
Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true ...
Original description
Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true and injects the resulting HTML with Vue’s v-html without sanitisation. At time of publication, there are no publicly available patches.
nvd CVSS3.1
7.3
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 6 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026