CVE Vulnerabilities

CVE-2026-29042

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)

Published: Mar 06, 2026 | Modified: Mar 10, 2026
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Nuclio is a Serverless framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20.

Weakness

The product does not adequately filter user-controlled input for special elements with control implications.

Affected Software

NameVendorStart VersionEnd Version
NuclioIguazio*1.15.20 (excluding)

Potential Mitigations

References