Kestra v1.3.3 and before is vulnerable to SQL Injection. The vulnerability occurs because user-controlled input from a GET parameter is directly concatenated into an SQL query without proper sanitization or parameterization. As a result, attackers can inject arbitrary SQL expressions into the database query.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 05 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Kestra SQL Injection via Unvalidated GET Parameter | |
| Weaknesses | CWE-20 CWE-89 |
Tue, 05 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kestra-io
Kestra-io kestra |
|
| Vendors & Products |
Kestra-io
Kestra-io kestra |
Tue, 05 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kestra v1.3.3 and before is vulnerable to SQL Injection. The vulnerability occurs because user-controlled input from a GET parameter is directly concatenated into an SQL query without proper sanitization or parameterization. As a result, attackers can inject arbitrary SQL expressions into the database query. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-05T18:10:56.956Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38428
No data.
Status : Received
Published: 2026-05-05T19:16:21.910
Modified: 2026-05-05T19:16:21.910
Link: CVE-2026-38428
No data.
OpenCVE Enrichment
Updated: 2026-05-05T20:00:13Z