CVE-2026-35171
Kedro · Kedro
Kedro is vulnerable to remote code execution due to unvalidated logging configuration paths that permit arbitrary callable instantiation.
Executive summary
A critical remote code execution vulnerability in Kedro allows attackers to execute arbitrary system commands via maliciously crafted logging configurations.
Vulnerability
The application loads logging configurations from a user-controlled environment variable (KEDRO_LOGGING_CONFIG) without validation. The configuration schema allows for arbitrary callable instantiation, which an attacker can exploit to execute system commands.
Business impact
Exploitation of this vulnerability grants the attacker the ability to execute code with the permissions of the Kedro process. This can lead to total system takeover, data exfiltration, and lateral movement within the production environment, justifying the 9.8 CVSS score.
Remediation
Immediate Action: Upgrade Kedro to version 1.3.0 or later to ensure logging configurations are properly validated.
Proactive Monitoring: Monitor system logs and process execution for unexpected child processes spawned by the Kedro application.
Compensating Controls: Restrict the ability of external users to set environment variables on systems running Kedro and implement OS-level hardening.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
The ability to achieve remote code execution makes this a high-priority risk. Administrators must update to the patched version of Kedro immediately to close this execution vector and protect the integrity of the data science environment.