CVE-2026-29042
March 06, 2026
Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20.
Affected Packages
https://github.com/nuclio/nuclio.git (GITHUB):
Affected version(s) >=0.1.0 <1.15.20Fix Suggestion:
Update to version 1.15.20github.com/nuclio/nuclio (GO):
Affected version(s) >=stable <v0.0.0-20260304152207-5352d7e16cf9Fix Suggestion:
Update to version v0.0.0-20260304152207-5352d7e16cf9Related ResourcesĀ (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
POC
CVSS v3
Base Score:
9.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
EPSS
Base Score:
0.69