Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kestra
Kestra kestra |
|
| CPEs | cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Kestra
Kestra kestra |
Fri, 27 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kestra-io
Kestra-io kestra |
|
| Vendors & Products |
Kestra-io
Kestra-io kestra |
Thu, 26 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kestra is an open-source, event-driven orchestration platform Versions up to and including 1.3.3 render user-supplied flow YAML metadata fields — description, inputs[].displayName, inputs[].description — through the Markdown.vue component instantiated with html: true. The resulting HTML is injected into the DOM via Vue's v-html without any sanitization. This allows a flow author to embed arbitrary JavaScript that executes in the browser of any user who views or interacts with the flow. This is distinct from GHSA-r36c-83hm-pc8j / CVE-2026-29082, which covers only FilePreview.vue rendering .md files from execution outputs. The present finding affects different components, different data sources, and requires significantly less user interaction (zero-click for input.displayName). As of time of publication, it is unclear if a patch is available. | |
| Title | Kestra Vulnerable to Stored Cross-Site Scripting via Flow YAML Fields | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T13:55:17.704Z
Reserved: 2026-03-23T15:23:42.220Z
Link: CVE-2026-33664
Updated: 2026-03-27T13:32:44.415Z
Status : Analyzed
Published: 2026-03-26T22:16:29.727
Modified: 2026-03-31T01:48:34.413
Link: CVE-2026-33664
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:01:28Z