top of page
perceptive_background_267k.jpg

Kestra is an open-source, event-driven orchestration platform Versions up to and including 1.3.3 render user-supplied flow YAML metadata fields — description, i…

Published:

25 March 2026 at 23:00:00

Alert date:

26 March 2026 at 23:03:12

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

CVE-2026-33664 affects Kestra, an open-source event-driven orchestration platform. Versions up to 1.3.3 are vulnerable to XSS attacks through unsanitized user-supplied YAML metadata fields. The vulnerability allows flow authors to inject arbitrary JavaScript that executes in browsers of users viewing the flow. The issue stems from the Markdown.vue component rendering HTML without sanitization via Vue's v-html. This represents a zero-click attack vector for input.displayName fields. The vulnerability is distinct from CVE-2026-29082 and affects different components with less user interaction required.

Technical details

Mitigation steps:

Affected products:

Kestra

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page