CVE-2026-7723
PrefectHQ prefect WebSocket Endpoint in missing authentication
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th
A flaw has been found in PrefectHQ prefect up to 3.6.13. Affected is an unknown function of the file /api/events/in of the component WebSocket Endpoint. Executing a manipulation can lead to missing authentication. The attack may be performed from remote. The exploit has been published and may be used. Upgrading to version 3.6.14 is able to address this issue. This patch is called 0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40. It is recommended to upgrade the affected component.
| CWE | CWE-306 CWE-287 |
| Vendor | prefecthq |
| Product | prefect |
| Published | May 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for prefecthq prefect
Be the first to know when new high vulnerabilities affecting prefecthq prefect are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
PrefectHQ / prefect
3.6.0 3.6.1 3.6.2 3.6.3 3.6.4 3.6.5 3.6.6 3.6.7 3.6.8 3.6.9 3.6.10 3.6.11 3.6.12 3.6.13
References
vuldb.com: https://vuldb.com/vuln/360899 vuldb.com: https://vuldb.com/vuln/360899/cti vuldb.com: https://vuldb.com/submit/807256 gist.github.com: https://gist.github.com/nedlir/f1ab8aa038aafbcc6beeef21fab1d74f github.com: https://github.com/PrefectHQ/prefect/pull/20372 github.com: https://github.com/PrefectHQ/prefect/commit/0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40 github.com: https://github.com/PrefectHQ/prefect/releases/tag/3.6.14 github.com: https://github.com/PrefectHQ/prefect/
Credits
๐ nedlir (VulDB User)