Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: prefect

Found 4 matching suggestions

View:
Compact
Detailed
Published
Permalink CVE-2026-7725
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 57 minutes ago by @LeSuisse Activity log
PrefectHQ prefect GitRepository Pull storage.py argument injection

A vulnerability was found in PrefectHQ prefect up to 3.6.25.dev6. Affected by this issue is some unknown functionality of the file src/prefect/runner/storage.py of the component GitRepository Pull Handler. The manipulation of the argument commit_sha/directories results in argument injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 3.6.25.dev7 can resolve this issue. The patch is identified as 6a9d9918716ce4ee0297b69f3046f7067ef1faae. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

prefect
  • ==3.6.25.dev6
  • ==3.6.25.dev7

Matching in nixpkgs

pkgs.prefect

Workflow orchestration framework for building resilient data pipelines in Python

Package maintainers

Published
Permalink CVE-2026-7723
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 58 minutes ago by @LeSuisse Activity log
PrefectHQ prefect WebSocket Endpoint in missing authentication

A flaw has been found in PrefectHQ prefect up to 3.6.13. Affected is an unknown function of the file /api/events/in of the component WebSocket Endpoint. Executing a manipulation can lead to missing authentication. The attack may be performed from remote. The exploit has been published and may be used. Upgrading to version 3.6.14 is able to address this issue. This patch is called f8afecadf88ea5f73694dafa3a365b9d8fae1ad6. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

prefect
  • ==3.6.6
  • ==3.6.12
  • ==3.6.8
  • ==3.6.14
  • ==3.6.7
  • ==3.6.1
  • ==3.6.0
  • ==3.6.10
  • ==3.6.2
  • ==3.6.11
  • ==3.6.3
  • ==3.6.13
  • ==3.6.5
  • ==3.6.4
  • ==3.6.9

Matching in nixpkgs

pkgs.prefect

Workflow orchestration framework for building resilient data pipelines in Python

Package maintainers

Published
Permalink CVE-2026-7724
5.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 59 minutes ago by @LeSuisse Activity log
PrefectHQ prefect Webhook/Notification validate_restricted_url toctou

A vulnerability has been found in PrefectHQ prefect up to 3.6.28.dev1. Affected by this vulnerability is the function validate_restricted_url of the component Webhook/Notification. The manipulation leads to time-of-check time-of-use. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.6.28.dev2 addresses this issue. The identifier of the patch is 7c70ac54a5e101431d83b9f2681ec88d5e0021ed. Upgrading the affected component is advised. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

prefect
  • ==3.6.28.dev1
  • ==3.6.28.dev2

Matching in nixpkgs

pkgs.prefect

Workflow orchestration framework for building resilient data pipelines in Python

Package maintainers

Published
Permalink CVE-2026-7722
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 59 minutes ago by @LeSuisse Activity log
PrefectHQ prefect Health Check API health endswith improper authentication

A vulnerability was detected in PrefectHQ prefect up to 3.6.21. This impacts the function endswith of the file /api/health of the component Health Check API. Performing a manipulation results in improper authentication. The attack is possible to be carried out remotely. The exploit is now public and may be used. Upgrading to version 3.6.22 will fix this issue. The patch is named e21617125335025b4b27e7d6f0ca028e8e8f3b79. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

prefect
  • ==3.6.6
  • ==3.6.21
  • ==3.6.4
  • ==3.6.20
  • ==3.6.9
  • ==3.6.14
  • ==3.6.12
  • ==3.6.8
  • ==3.6.16
  • ==3.6.1
  • ==3.6.0
  • ==3.6.13
  • ==3.6.17
  • ==3.6.15
  • ==3.6.18
  • ==3.6.19
  • ==3.6.10
  • ==3.6.2
  • ==3.6.3
  • ==3.6.5
  • ==3.6.22
  • ==3.6.7
  • ==3.6.11

Matching in nixpkgs

pkgs.prefect

Workflow orchestration framework for building resilient data pipelines in Python

Package maintainers