CVE-2026-29042

CRITICAL

Nuclio <1.15.20 - Command Injection

Title source: llm
STIX 2.1

Description

Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20.

Scores

CVSS v3 9.8
EPSS 0.0028
EPSS Percentile 51.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-75
Status published
Products (2)
iguazio/nuclio < 1.15.20
nuclio/nuclio 0 - 1.15.20Go
Published Mar 06, 2026
Tracked Since Mar 06, 2026