Description

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema supports the special () key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during application startup. This is a critical remote code execution (RCE) vulnerability caused by unsafe use of logging.config.dictConfig() with user-controlled input. This vulnerability is fixed in 1.3.0.

INFO

Published Date :

2026-04-06T17:45:45.664Z

Last Modified :

2026-04-06T17:45:45.664Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-35171 vulnerability.

Vendors Products
Kedro-org
  • Kedro
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35171.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact