diff --git a/advisories/unreviewed/2026/05/GHSA-hvph-5985-r63v/GHSA-hvph-5985-r63v.json b/advisories/unreviewed/2026/05/GHSA-hvph-5985-r63v/GHSA-hvph-5985-r63v.json new file mode 100644 index 0000000000000..ae117f77d97f9 --- /dev/null +++ b/advisories/unreviewed/2026/05/GHSA-hvph-5985-r63v/GHSA-hvph-5985-r63v.json @@ -0,0 +1,88 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hvph-5985-r63v", + "modified": "2026-05-04T03:31:37Z", + "published": "2026-05-04T03:31:28Z", + "aliases": [ + "CVE-2026-7723" + ], + "summary": "Prefect Unauthenticated Event Injection via /api/events/in WebSocket", + "details": "A flaw has been found in PrefectHQ prefect up to 3.6.13. Affected is an unknown function of the file /api/events/in of the component WebSocket Endpoint. Executing a manipulation can lead to missing authentication. The attack may be performed from remote. The exploit has been published and may be used. Upgrading to version 3.6.14 is able to address this issue. This patch is called 0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40. It is recommended to upgrade the affected component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "perfect" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.6.14" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 3.6.13" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-7723" + }, + { + "type": "WEB", + "url": "https://github.com/PrefectHQ/prefect/pull/20372" + }, + { + "type": "WEB", + "url": "https://github.com/PrefectHQ/prefect/commit/0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40" + }, + { + "type": "WEB", + "url": "https://gist.github.com/nedlir/f1ab8aa038aafbcc6beeef21fab1d74f" + }, + { + "type": "WEB", + "url": "https://github.com/PrefectHQ/prefect" + }, + { + "type": "WEB", + "url": "https://github.com/PrefectHQ/prefect/releases/tag/3.6.14" + }, + { + "type": "WEB", + "url": "https://vuldb.com/submit/807256" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/360899" + }, + { + "type": "WEB", + "url": "https://vuldb.com/vuln/360899/cti" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-05-04T03:16:13Z" + } +} \ No newline at end of file