Description
Kestra v1.3.3 and before is vulnerable to SQL Injection. The vulnerability occurs because user-controlled input from a GET parameter is directly concatenated into an SQL query without proper sanitization or parameterization. As a result, attackers can inject arbitrary SQL expressions into the database query.
Published: 2026-05-05
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Kestra
Kestra kestra
CPEs cpe:2.3:a:kestra:kestra:*:*:*:*:*:*:*:*
Vendors & Products Kestra
Kestra kestra

Wed, 06 May 2026 21:45:00 +0000

Type Values Removed Values Added
Title Kestra v1.3.3 and Earlier Vulnerable to SQL Injection via Unsanitized GET Parameter

Wed, 06 May 2026 18:15:00 +0000

Type Values Removed Values Added
Title Kestra SQL Injection via Unvalidated GET Parameter
Weaknesses CWE-20

Wed, 06 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 May 2026 20:15:00 +0000

Type Values Removed Values Added
Title Kestra SQL Injection via Unvalidated GET Parameter
Weaknesses CWE-20
CWE-89

Tue, 05 May 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Kestra-io
Kestra-io kestra
Vendors & Products Kestra-io
Kestra-io kestra

Tue, 05 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Kestra v1.3.3 and before is vulnerable to SQL Injection. The vulnerability occurs because user-controlled input from a GET parameter is directly concatenated into an SQL query without proper sanitization or parameterization. As a result, attackers can inject arbitrary SQL expressions into the database query.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-06T15:26:08.310Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-38428

cve-icon Vulnrichment

Updated: 2026-05-06T13:23:43.127Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-05T19:16:21.910

Modified: 2026-05-08T19:24:29.867

Link: CVE-2026-38428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T21:30:12Z

Weaknesses