CVE-2026-7725
PrefectHQ prefect GitRepository Pull storage.py argument injection
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in PrefectHQ prefect up to 3.6.25.dev6. Affected by this issue is some unknown functionality of the file src/prefect/runner/storage.py of the component GitRepository Pull Handler. The manipulation of the argument commit_sha/directories results in argument injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 3.6.25.dev7 can resolve this issue. The patch is identified as 6a9d9918716ce4ee0297b69f3046f7067ef1faae. It is advisable to upgrade the affected component.
| CWE | CWE-88 CWE-74 |
| Vendor | prefecthq |
| Product | prefect |
| Published | May 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for prefecthq prefect
Be the first to know when new medium vulnerabilities affecting prefecthq prefect are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
PrefectHQ / prefect
3.6.25.dev6
References
vuldb.com: https://vuldb.com/vuln/360901 vuldb.com: https://vuldb.com/vuln/360901/cti vuldb.com: https://vuldb.com/submit/807356 gist.github.com: https://gist.github.com/nedlir/c37d90dda5f715790eafc970b2ef0c8a github.com: https://github.com/PrefectHQ/prefect/pull/21384 github.com: https://github.com/PrefectHQ/prefect/commit/6a9d9918716ce4ee0297b69f3046f7067ef1faae github.com: https://github.com/PrefectHQ/prefect/releases/tag/3.6.25.dev7 github.com: https://github.com/PrefectHQ/prefect/
Credits
๐ nedlir (VulDB User)