Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-95fj-3w7g-4r27 | Nuclio Shell Runtime Command Injection Leading to Privilege Escalation |
Tue, 10 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iguazio
Iguazio nuclio |
|
| CPEs | cpe:2.3:a:iguazio:nuclio:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Iguazio
Iguazio nuclio |
|
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nuclio
Nuclio nuclio |
|
| Vendors & Products |
Nuclio
Nuclio nuclio |
Fri, 06 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20. | |
| Title | Nuclio Shell Runtime Command Injection Leading to Privilege Escalation | |
| Weaknesses | CWE-75 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T19:57:06.516Z
Reserved: 2026-03-03T17:50:11.242Z
Link: CVE-2026-29042
Updated: 2026-03-09T19:57:01.432Z
Status : Analyzed
Published: 2026-03-06T07:16:01.743
Modified: 2026-03-10T19:32:49.967
Link: CVE-2026-29042
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:30:15Z
Github GHSA