Home » Database

AVID-2026-R1383

Description

Remote Code Execution in kedro-org/kedro (CVE-2024-12215)

Details

In kedro-org/kedro version 0.19.8, the pull_package() API function allows users to download and extract micro packages from the Internet. However, the function project_wheel_metadata() within the code path can execute the setup.py file inside the tar file, leading to remote code execution (RCE) by running arbitrary commands on the victim’s machine.

Reason for inclusion in AVID: The CVE describes a remote code execution vulnerability in kedro’s pull_package flow, where setup.py inside downloaded tarballs can be executed, enabling arbitrary code execution. Kedro is a Python framework widely used in ML/data-pipeline contexts; this directly affects software supply chains for AI systems (dependencies, pipelines, tooling). It is a software vulnerability (not hardware/firmware-only) with clear security impact (RCE) and sufficient evidence in the report.

References

Affected or Relevant Artifacts

  • Developer: kedro-org
  • Deployer: kedro-org
  • Artifact Details:
TypeName
Systemkedro-org/kedro

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionREQUIRED
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-94CWE-94 Improper Control of Generation of Code

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry