Vulnerability Description
Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Palletsprojects | Click | < 8.3.3 |
Related Weaknesses (CWE)
References
- https://github.com/pallets/click/releases/tag/8.3.3ProductPatch
- https://github.com/tsigouris007/security-advisories/security/advisories/GHSA-47fExploitThird Party Advisory
- https://github.com/tsigouris007/security-advisories/security/advisories/GHSA-47fExploitThird Party Advisory
FAQ
What is CVE-2026-7246?
CVE-2026-7246 is a vulnerability with a CVSS score of 7.2 (HIGH). Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account.
How severe is CVE-2026-7246?
CVE-2026-7246 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7246?
Check the references section above for vendor advisories and patch information. Affected products include: Palletsprojects Click.