CVE-2026-29042
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
06/03/2026
Last modified:
10/03/2026
Description
Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20.
Impact
Base Score 4.0
8.90
Severity 4.0
HIGH
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:iguazio:nuclio:*:*:*:*:*:*:*:* | 1.15.20 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



