Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-34612 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

**Essence**: SQL Injection vulnerability πŸ’‰ in Kestra orchestration platform **Consequences**: - 🚨 Remote Code Execution (RCE) - 🚨 Direct control of host operating system - 🚨 Complete server takeover

Q2Root Cause? (CWE/Flaw)

**CWE-89**: SQL Injection **Vulnerability Points**: - πŸ” `GET /api/v1/main/flows/search` endpoint - πŸ” User input directly concatenated into SQL without filtering - πŸ” PostgreSQL `COPY ...…

Q3Who is affected? (Versions/Components)

**Affected Versions**: < 1.3.7 ⚠️ **Components**: - 🎯 Kestra core platform - 🎯 Default docker-compose deployment configuration - 🎯 Associated PostgreSQL database

Q4What can hackers do? (Privileges/Data)

**Attacker Privileges**: πŸ”₯ **SYSTEM-level** **Capabilities**: - πŸ’€ Execute arbitrary OS commands - πŸ’€ Steal all data - πŸ’€ Lateral movement / implant backdoors - πŸ’€ Delete / encrypt for ransom

Q5Is exploitation threshold high? (Auth/Config)

**Barrier: Low** βœ… **Conditions**: - πŸ”‘ Requires **authentication** (regular user sufficient) - πŸ”‘ Only needs access to a **crafted link** - πŸ”‘ No interaction required, no admin privileges needed - πŸ”‘ Network reachability i…

Q6Is there a public Exp? (PoC/Wild Exploitation)

**PoC**: ❌ Not publicly disclosed (`"pocs": []`) **In-the-wild Exploitation**: Unknown ⚠️ **But Note**: - πŸ’‘ Vulnerability mechanism is clear (SQLi β†’ RCE) - πŸ’‘ Exploitation chain is simple, attackers can easily construct…

Q7How to self-check? (Features/Scanning)

**Self-Check Methods**: - πŸ” **Version Check**: `kestra --version` or check via UI - πŸ” **Traffic Signatures**: Monitor abnormal parameters in `/api/v1/main/flows/search` - πŸ” **Log Audit**: Search PostgreSQL logs for `COP…

Q8Is it fixed officially? (Patch/Mitigation)

**Fixed** βœ… **Patch**: - πŸ›‘οΈ Version **1.3.7** released - πŸ›‘οΈ Commit: `3926762795df8ad3e03924b370c51832ed3a21d3` - πŸ›‘οΈ Official Security Advisory: GHSA-365w-2m69-mp9x **Upgrade Immediately** ⬆️

Q9What if no patch? (Workaround)

**Temporary Mitigation** (when upgrade not possible): - 🚫 **WAF Rules**: Block `COPY.*TO.*PROGRAM` patterns - 🚫 **Network Isolation**: Restrict access sources to `/api/v1/main/flows/search` - 🚫 **Privilege Restriction**…

Q10Is it urgent? (Priority Suggestion)

**Priority: πŸ”΄ CRITICAL (Highest)** **Rationale**: - ⚑ CVSS 3.1 Score: **9.9** (near maximum) - ⚑ Network exploitable + low privilege requirement + complete system control - ⚑ Orchestration platforms typically hold cloud…