CVE-2026-34612

Kestra · Kestra

A SQL Injection vulnerability in Kestra's flow search endpoint allows authenticated users to execute arbitrary OS commands on the host via PostgreSQL's COPY TO PROGRAM functionality.

Executive summary

Kestra orchestration platforms are vulnerable to a critical SQL injection that enables authenticated attackers to execute arbitrary operating system commands on the host server.

Vulnerability

The GET /api/v1/main/flows/search endpoint is susceptible to SQL injection. An authenticated attacker can use a crafted link to trigger a payload executed by the underlying PostgreSQL database to run arbitrary shell commands.

Business impact

Successful exploitation results in Remote Code Execution (RCE) on the host system, leading to full server compromise and data exfiltration. With a CVSS score of 9.9, this vulnerability presents a near-maximum risk to any organization running the default docker-compose deployment of Kestra.

Remediation

Immediate Action: Update the Kestra platform to version 1.3.7 or later to patch the vulnerable API endpoint and sanitize SQL inputs.

Proactive Monitoring: Audit database logs for unusual COPY ... TO PROGRAM statements and review application logs for suspicious activity on the /flows/search endpoint.

Compensating Controls: Implement a Web Application Firewall (WAF) with strict SQL injection protection rules to filter malicious parameters in API requests.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Remote Code Execution via SQL injection is a highly critical threat vector. Organizations must prioritize the update to Kestra version 1.3.7 immediately to secure their orchestration workflows and the underlying host infrastructure.