Home

Description

A vulnerability was found in PrefectHQ prefect up to 3.6.25.dev6. Affected by this issue is some unknown functionality of the file src/prefect/runner/storage.py of the component GitRepository Pull Handler. The manipulation of the argument commit_sha/directories results in argument injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 3.6.25.dev7 can resolve this issue. The patch is identified as 6a9d9918716ce4ee0297b69f3046f7067ef1faae. It is advisable to upgrade the affected component.

PUBLISHED Reserved 2026-05-03 | Published 2026-05-04 | Updated 2026-05-04 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Argument Injection

Injection

Product status

3.6.25.dev6
affected

3.6.25.dev7
unaffected

Timeline

2026-05-03:Advisory disclosed
2026-05-03:VulDB entry created
2026-05-03:VulDB entry last update

Credits

nedlir (VulDB User) reporter

References

vuldb.com/vuln/360901 (VDB-360901 | PrefectHQ prefect GitRepository Pull storage.py argument injection) vdb-entry technical-description

vuldb.com/vuln/360901/cti (VDB-360901 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/807356 (Submit #807356 | PerfectHQ Perfect <= 3.6.24 Argument Injection) third-party-advisory

gist.github.com/nedlir/c37d90dda5f715790eafc970b2ef0c8a exploit

github.com/PrefectHQ/prefect/pull/21384 issue-tracking patch

github.com/...ommit/6a9d9918716ce4ee0297b69f3046f7067ef1faae patch

github.com/PrefectHQ/prefect/releases/tag/3.6.25.dev7 patch

github.com/PrefectHQ/prefect/ product

cve.org (CVE-2026-7725)

nvd.nist.gov (CVE-2026-7725)

Download JSON