Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account.
References
| Link | Resource |
|---|---|
| https://github.com/pallets/click/releases/tag/8.3.3 | Product Patch |
| https://github.com/tsigouris007/security-advisories/security/advisories/GHSA-47fr-3ffg-hgmw | Exploit Third Party Advisory |
| https://github.com/tsigouris007/security-advisories/security/advisories/GHSA-47fr-3ffg-hgmw | Exploit Third Party Advisory |
Configurations
History
30 Apr 2026, 16:39
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-30 14:16
Updated : 2026-04-30 16:39
NVD link : CVE-2026-7246
Mitre link : CVE-2026-7246
CVE.ORG link : CVE-2026-7246
JSON object : View
Products Affected
palletsprojects
- click
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
