CVE-2026-29042

High
|8.9
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute arbitrary shell commands on the server by sending specially crafted HTTP requests with malicious input in the X-Nuclio-Arguments header. It affects versions prior to 1.15.20, and the attacker needs to be able to invoke functions through the Nuclio framework to exploit this flaw.

Technical Description

Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$5,000($1K-$5K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Mar 6, 2026

about 1 month ago

Last Modified

Mar 10, 2026

28 days ago

Vendor

iguazio

Product

nuclio