Home

Description

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema supports the special () key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during application startup. This is a critical remote code execution (RCE) vulnerability caused by unsafe use of logging.config.dictConfig() with user-controlled input. This vulnerability is fixed in 1.3.0.

PUBLISHED Reserved 2026-04-01 | Published 2026-04-06 | Updated 2026-04-07 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

CWE-502: Deserialization of Untrusted Data

Product status

< 1.3.0
affected

References

github.com/.../kedro/security/advisories/GHSA-9cqf-439c-j96r

cve.org (CVE-2026-35171)

nvd.nist.gov (CVE-2026-35171)

Download JSON