HomeLinuxfoundationCVE-2026-35171

CVE-2026-35171

CRITICAL
9.8CVSS
Published: 2026-04-06
Updated: 2026-04-14
AI Analysis

Description

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema supports the special () key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during application startup. This is a critical remote code execution (RCE) vulnerability caused by unsafe use of logging.config.dictConfig() with user-controlled input. This vulnerability is fixed in 1.3.0.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-94CWE-502

Metadata

Primary Vendor
LINUXFOUNDATION
Published
4/6/2026
Last Modified
4/14/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

linuxfoundation : kedro

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-35171 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com