Description
Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema supports the special () key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during application startup. This is a critical remote code execution (RCE) vulnerability caused by unsafe use of logging.config.dictConfig() with user-controlled input. This vulnerability is fixed in 1.3.0.
INFO
Published Date :
2026-04-06T17:45:45.664Z
Last Modified :
2026-04-06T17:45:45.664Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-35171 vulnerability.
| Vendors | Products |
|---|---|
| Kedro-org |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35171.