CVE-2026-34612
Published: 03 April 2026
Description
Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/v1/main/flows/search". Once a user is authenticated, simply visiting…
more
a crafted link is enough to trigger the vulnerability. The injected payload is executed by PostgreSQL using COPY ... TO PROGRAM ..., which in turn runs arbitrary OS commands on the host. This issue has been patched in version 1.3.7.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection attacks by validating and sanitizing user inputs to the vulnerable /api/v1/main/flows/search endpoint.
Ensures timely patching of the specific SQL injection flaw as fixed in Kestra version 1.3.7.
Vulnerability scanning identifies SQL injection vulnerabilities like this one in the application prior to exploitation.
Security SummaryAI
CVE-2026-34612 is a SQL injection vulnerability in Kestra, an open-source event-driven orchestration platform, affecting versions prior to 1.3.7 in the default Docker Compose deployment. The flaw resides in the GET /api/v1/main/flows/search endpoint, where unsanitized input allows attackers to inject malicious SQL payloads. This injection leverages PostgreSQL's COPY ... TO PROGRAM ... command, enabling remote code execution (RCE) by executing arbitrary OS commands on the host system. The vulnerability carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is classified under CWE-89.
An authenticated user with low privileges can exploit this vulnerability simply by visiting a crafted URL targeting the search endpoint, requiring no additional interaction. Successful exploitation grants attackers full RCE on the underlying host, potentially allowing complete compromise of the orchestration platform and any connected systems or data workflows.
Kestra addressed this issue in version 1.3.7, as detailed in the project's security advisory (GHSA-365w-2m69-mp9x), release notes, and the patching commit. Security practitioners should upgrade to 1.3.7 or later and review deployments for exposure of the affected endpoint.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in remote web API endpoint (/api/v1/main/flows/search) enables low-privileged authenticated attackers to achieve RCE via PostgreSQL COPY TO PROGRAM, directly facilitating exploitation of remote services (T1210) and privilege escalation (T1068).