๐Ÿ” CVE Alert

CVE-2026-7723

HIGH 7.3

PrefectHQ prefect WebSocket Endpoint in missing authentication

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A flaw has been found in PrefectHQ prefect up to 3.6.13. Affected is an unknown function of the file /api/events/in of the component WebSocket Endpoint. Executing a manipulation can lead to missing authentication. The attack may be performed from remote. The exploit has been published and may be used. Upgrading to version 3.6.14 is able to address this issue. This patch is called 0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40. It is recommended to upgrade the affected component.

CWE CWE-306 CWE-287
Vendor prefecthq
Product prefect
Published May 4, 2026
Stay Ahead of the Next One

Get instant alerts for prefecthq prefect

Be the first to know when new high vulnerabilities affecting prefecthq prefect are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

PrefectHQ / prefect
3.6.0 3.6.1 3.6.2 3.6.3 3.6.4 3.6.5 3.6.6 3.6.7 3.6.8 3.6.9 3.6.10 3.6.11 3.6.12 3.6.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360899 vuldb.com: https://vuldb.com/vuln/360899/cti vuldb.com: https://vuldb.com/submit/807256 gist.github.com: https://gist.github.com/nedlir/f1ab8aa038aafbcc6beeef21fab1d74f github.com: https://github.com/PrefectHQ/prefect/pull/20372 github.com: https://github.com/PrefectHQ/prefect/commit/0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40 github.com: https://github.com/PrefectHQ/prefect/releases/tag/3.6.14 github.com: https://github.com/PrefectHQ/prefect/

Credits

๐Ÿ” nedlir (VulDB User)