Intel

AIKIDO-2026-10503

github.com/influxdata/kapacitor is vulnerable to Remote Code Execution (RCE)

Remote Code Execution (RCE) Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

91

Critical Risk

This Affects:

GOgithub.com/influxdata/kapacitor
0.0.1 - 1.8.3
Fixed in 1.8.4
Are you affected? Scan for Free

TL;DR

Affected versions of this package are vulnerable to remote code execution (RCE) due to improper enforcement of disabled alert handlers in TICKscript processing. The affected logic allows scripts to invoke alert handler methods such as .exec(), .log(), or .tcp() directly even when corresponding handlers are configured as disabled via command-line restrictions. An attacker able to create or modify TICKscripts can bypass administrative security controls and execute unauthorized commands or trigger unintended outbound actions on the host system.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

github.com/influxdata/kapacitor is vulnerable to Remote Code Execution (RCE) in versions 0.0.1 - 1.8.3.

How to fix this

Upgrade the github.com/influxdata/kapacitor library to the patch version.