๐Ÿ” CVE Alert

CVE-2026-7725

MEDIUM 6.3

PrefectHQ prefect GitRepository Pull storage.py argument injection

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in PrefectHQ prefect up to 3.6.25.dev6. Affected by this issue is some unknown functionality of the file src/prefect/runner/storage.py of the component GitRepository Pull Handler. The manipulation of the argument commit_sha/directories results in argument injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 3.6.25.dev7 can resolve this issue. The patch is identified as 6a9d9918716ce4ee0297b69f3046f7067ef1faae. It is advisable to upgrade the affected component.

CWE CWE-88 CWE-74
Vendor prefecthq
Product prefect
Published May 4, 2026
Stay Ahead of the Next One

Get instant alerts for prefecthq prefect

Be the first to know when new medium vulnerabilities affecting prefecthq prefect are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

PrefectHQ / prefect
3.6.25.dev6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360901 vuldb.com: https://vuldb.com/vuln/360901/cti vuldb.com: https://vuldb.com/submit/807356 gist.github.com: https://gist.github.com/nedlir/c37d90dda5f715790eafc970b2ef0c8a github.com: https://github.com/PrefectHQ/prefect/pull/21384 github.com: https://github.com/PrefectHQ/prefect/commit/6a9d9918716ce4ee0297b69f3046f7067ef1faae github.com: https://github.com/PrefectHQ/prefect/releases/tag/3.6.25.dev7 github.com: https://github.com/PrefectHQ/prefect/

Credits

๐Ÿ” nedlir (VulDB User)