Refine your search

4 vulnerabilities found for prefect by PrefectHQ

CVE-2026-7725 (GCVE-0-2026-7725)
Vulnerability from cvelistv5
Published
2026-05-04 03:00
Modified
2026-05-04 03:00
CWE
Summary
A vulnerability was found in PrefectHQ prefect up to 3.6.25.dev6. Affected by this issue is some unknown functionality of the file src/prefect/runner/storage.py of the component GitRepository Pull Handler. The manipulation of the argument commit_sha/directories results in argument injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 3.6.25.dev7 can resolve this issue. The patch is identified as 6a9d9918716ce4ee0297b69f3046f7067ef1faae. It is advisable to upgrade the affected component.
Impacted products
Vendor Product Version
PrefectHQ prefect Version: 3.6.25.dev6
    cpe:2.3:a:prefect:prefect:*:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:prefect:prefect:*:*:*:*:*:*:*:*"
          ],
          "modules": [
            "GitRepository Pull Handler"
          ],
          "product": "prefect",
          "vendor": "PrefectHQ",
          "versions": [
            {
              "status": "affected",
              "version": "3.6.25.dev6"
            },
            {
              "status": "unaffected",
              "version": "3.6.25.dev7"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "nedlir (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in PrefectHQ prefect up to 3.6.25.dev6. Affected by this issue is some unknown functionality of the file src/prefect/runner/storage.py of the component GitRepository Pull Handler. The manipulation of the argument commit_sha/directories results in argument injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 3.6.25.dev7 can resolve this issue. The patch is identified as 6a9d9918716ce4ee0297b69f3046f7067ef1faae. It is advisable to upgrade the affected component."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.5,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "Argument Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-04T03:00:17.845Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-360901 | PrefectHQ prefect GitRepository Pull storage.py argument injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/vuln/360901"
        },
        {
          "name": "VDB-360901 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/vuln/360901/cti"
        },
        {
          "name": "Submit #807356 | PerfectHQ Perfect \u003c= 3.6.24 Argument Injection",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/submit/807356"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://gist.github.com/nedlir/c37d90dda5f715790eafc970b2ef0c8a"
        },
        {
          "tags": [
            "issue-tracking",
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/pull/21384"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/commit/6a9d9918716ce4ee0297b69f3046f7067ef1faae"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/releases/tag/3.6.25.dev7"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://github.com/PrefectHQ/prefect/"
        }
      ],
      "tags": [
        "x_open-source"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-05-03T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-05-03T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-05-03T11:23:39.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "PrefectHQ prefect GitRepository Pull storage.py argument injection"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-7725",
    "datePublished": "2026-05-04T03:00:17.845Z",
    "dateReserved": "2026-05-03T09:18:22.828Z",
    "dateUpdated": "2026-05-04T03:00:17.845Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-7724 (GCVE-0-2026-7724)
Vulnerability from cvelistv5
Published
2026-05-04 02:45
Modified
2026-05-04 02:45
CWE
Summary
A vulnerability has been found in PrefectHQ prefect up to 3.6.28.dev1. Affected by this vulnerability is the function validate_restricted_url of the component Webhook/Notification. The manipulation leads to time-of-check time-of-use. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.6.28.dev2 addresses this issue. The identifier of the patch is 7c70ac54a5e101431d83b9f2681ec88d5e0021ed. Upgrading the affected component is advised.
Impacted products
Vendor Product Version
PrefectHQ prefect Version: 3.6.28.dev1
    cpe:2.3:a:prefect:prefect:*:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:prefect:prefect:*:*:*:*:*:*:*:*"
          ],
          "modules": [
            "Webhook/Notification"
          ],
          "product": "prefect",
          "vendor": "PrefectHQ",
          "versions": [
            {
              "status": "affected",
              "version": "3.6.28.dev1"
            },
            {
              "status": "unaffected",
              "version": "3.6.28.dev2"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "nedlir (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in PrefectHQ prefect up to 3.6.28.dev1. Affected by this vulnerability is the function validate_restricted_url of the component Webhook/Notification. The manipulation leads to time-of-check time-of-use. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.6.28.dev2 addresses this issue. The identifier of the patch is 7c70ac54a5e101431d83b9f2681ec88d5e0021ed. Upgrading the affected component is advised."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 4.6,
            "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-367",
              "description": "Time-of-check Time-of-use",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-362",
              "description": "Race Condition",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-04T02:45:12.517Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-360900 | PrefectHQ prefect Webhook/Notification validate_restricted_url toctou",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/vuln/360900"
        },
        {
          "name": "VDB-360900 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/vuln/360900/cti"
        },
        {
          "name": "Submit #807303 | PerfectHQ Perfect \u003e=3.6.26  Time-of-check Time-of-use",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/submit/807303"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://linear.app/prefect/issue/OSS-7874/fix-dns-rebinding-toctou-bypass-in-validate-restricted-url"
        },
        {
          "tags": [
            "issue-tracking",
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/pull/21591"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://gist.github.com/nedlir/fa99777e8989414585d08c3625bf044a"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/commit/7c70ac54a5e101431d83b9f2681ec88d5e0021ed"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/releases/tag/3.6.28.dev2"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://github.com/PrefectHQ/prefect/"
        }
      ],
      "tags": [
        "x_open-source"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-05-03T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-05-03T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-05-03T11:23:35.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "PrefectHQ prefect Webhook/Notification validate_restricted_url toctou"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-7724",
    "datePublished": "2026-05-04T02:45:12.517Z",
    "dateReserved": "2026-05-03T09:18:19.872Z",
    "dateUpdated": "2026-05-04T02:45:12.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-7723 (GCVE-0-2026-7723)
Vulnerability from cvelistv5
Published
2026-05-04 02:30
Modified
2026-05-04 11:34
CWE
Summary
A flaw has been found in PrefectHQ prefect up to 3.6.13. Affected is an unknown function of the file /api/events/in of the component WebSocket Endpoint. Executing a manipulation can lead to missing authentication. The attack may be performed from remote. The exploit has been published and may be used. Upgrading to version 3.6.14 is able to address this issue. This patch is called 0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40. It is recommended to upgrade the affected component.
Impacted products
Vendor Product Version
PrefectHQ prefect Version: 3.6.0
Version: 3.6.1
Version: 3.6.2
Version: 3.6.3
Version: 3.6.4
Version: 3.6.5
Version: 3.6.6
Version: 3.6.7
Version: 3.6.8
Version: 3.6.9
Version: 3.6.10
Version: 3.6.11
Version: 3.6.12
Version: 3.6.13
    cpe:2.3:a:prefect:prefect:*:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-7723",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-05-04T11:33:53.101447Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-05-04T11:34:08.175Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:prefect:prefect:*:*:*:*:*:*:*:*"
          ],
          "modules": [
            "WebSocket Endpoint"
          ],
          "product": "prefect",
          "vendor": "PrefectHQ",
          "versions": [
            {
              "status": "affected",
              "version": "3.6.0"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.6.4"
            },
            {
              "status": "affected",
              "version": "3.6.5"
            },
            {
              "status": "affected",
              "version": "3.6.6"
            },
            {
              "status": "affected",
              "version": "3.6.7"
            },
            {
              "status": "affected",
              "version": "3.6.8"
            },
            {
              "status": "affected",
              "version": "3.6.9"
            },
            {
              "status": "affected",
              "version": "3.6.10"
            },
            {
              "status": "affected",
              "version": "3.6.11"
            },
            {
              "status": "affected",
              "version": "3.6.12"
            },
            {
              "status": "affected",
              "version": "3.6.13"
            },
            {
              "status": "unaffected",
              "version": "3.6.14"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "nedlir (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw has been found in PrefectHQ prefect up to 3.6.13. Affected is an unknown function of the file /api/events/in of the component WebSocket Endpoint. Executing a manipulation can lead to missing authentication. The attack may be performed from remote. The exploit has been published and may be used. Upgrading to version 3.6.14 is able to address this issue. This patch is called 0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40. It is recommended to upgrade the affected component."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 7.5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "Missing Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-04T02:30:18.099Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-360899 | PrefectHQ prefect WebSocket Endpoint in missing authentication",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://vuldb.com/vuln/360899"
        },
        {
          "name": "VDB-360899 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/vuln/360899/cti"
        },
        {
          "name": "Submit #807256 | PerfectHQ Perfect \u003c=3.6.13 Missing Critical Step in Authentication",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/submit/807256"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://gist.github.com/nedlir/f1ab8aa038aafbcc6beeef21fab1d74f"
        },
        {
          "tags": [
            "issue-tracking",
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/pull/20372"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/commit/0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/releases/tag/3.6.14"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://github.com/PrefectHQ/prefect/"
        }
      ],
      "tags": [
        "x_open-source"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-05-03T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-05-03T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-05-03T11:23:31.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "PrefectHQ prefect WebSocket Endpoint in missing authentication"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-7723",
    "datePublished": "2026-05-04T02:30:18.099Z",
    "dateReserved": "2026-05-03T09:18:16.724Z",
    "dateUpdated": "2026-05-04T11:34:08.175Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-7722 (GCVE-0-2026-7722)
Vulnerability from cvelistv5
Published
2026-05-04 02:15
Modified
2026-05-04 12:56
CWE
  • CWE-287 - Improper Authentication
Summary
A vulnerability was detected in PrefectHQ prefect up to 3.6.21. This impacts the function endswith of the file /api/health of the component Health Check API. Performing a manipulation results in improper authentication. The attack is possible to be carried out remotely. The exploit is now public and may be used. Upgrading to version 3.6.22 will fix this issue. Upgrading the affected component is recommended.
Impacted products
Vendor Product Version
PrefectHQ prefect Version: 3.6.0
Version: 3.6.1
Version: 3.6.2
Version: 3.6.3
Version: 3.6.4
Version: 3.6.5
Version: 3.6.6
Version: 3.6.7
Version: 3.6.8
Version: 3.6.9
Version: 3.6.10
Version: 3.6.11
Version: 3.6.12
Version: 3.6.13
Version: 3.6.14
Version: 3.6.15
Version: 3.6.16
Version: 3.6.17
Version: 3.6.18
Version: 3.6.19
Version: 3.6.20
Version: 3.6.21
    cpe:2.3:a:prefect:prefect:*:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-7722",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-05-04T12:56:10.889706Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-05-04T12:56:25.514Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:prefect:prefect:*:*:*:*:*:*:*:*"
          ],
          "modules": [
            "Health Check API"
          ],
          "product": "prefect",
          "vendor": "PrefectHQ",
          "versions": [
            {
              "status": "affected",
              "version": "3.6.0"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.6.4"
            },
            {
              "status": "affected",
              "version": "3.6.5"
            },
            {
              "status": "affected",
              "version": "3.6.6"
            },
            {
              "status": "affected",
              "version": "3.6.7"
            },
            {
              "status": "affected",
              "version": "3.6.8"
            },
            {
              "status": "affected",
              "version": "3.6.9"
            },
            {
              "status": "affected",
              "version": "3.6.10"
            },
            {
              "status": "affected",
              "version": "3.6.11"
            },
            {
              "status": "affected",
              "version": "3.6.12"
            },
            {
              "status": "affected",
              "version": "3.6.13"
            },
            {
              "status": "affected",
              "version": "3.6.14"
            },
            {
              "status": "affected",
              "version": "3.6.15"
            },
            {
              "status": "affected",
              "version": "3.6.16"
            },
            {
              "status": "affected",
              "version": "3.6.17"
            },
            {
              "status": "affected",
              "version": "3.6.18"
            },
            {
              "status": "affected",
              "version": "3.6.19"
            },
            {
              "status": "affected",
              "version": "3.6.20"
            },
            {
              "status": "affected",
              "version": "3.6.21"
            },
            {
              "status": "unaffected",
              "version": "3.6.22"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "nedlir (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was detected in PrefectHQ prefect up to 3.6.21. This impacts the function endswith of the file /api/health of the component Health Check API. Performing a manipulation results in improper authentication. The attack is possible to be carried out remotely. The exploit is now public and may be used. Upgrading to version 3.6.22 will fix this issue. Upgrading the affected component is recommended."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-04T02:15:18.541Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-360898 | PrefectHQ prefect Health Check API health endswith improper authentication",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/vuln/360898"
        },
        {
          "name": "VDB-360898 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/vuln/360898/cti"
        },
        {
          "name": "Submit #807255 | PrefectHQ Perfect \u003c=3.6.21 Improper Authentication",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/submit/807255"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://gist.github.com/nedlir/f576abbb0e491dc9bb7e106c140dda04"
        },
        {
          "tags": [
            "issue-tracking",
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/pull/21063"
        },
        {
          "tags": [
            "issue-tracking",
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/pull/21063/changes/d8c4ff97ef7c0a940925d32b2d76324c8def42de"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/PrefectHQ/prefect/releases/tag/3.6.22"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://github.com/PrefectHQ/prefect/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-05-03T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-05-03T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-05-03T11:23:28.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "PrefectHQ prefect Health Check API health endswith improper authentication"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-7722",
    "datePublished": "2026-05-04T02:15:18.541Z",
    "dateReserved": "2026-05-03T09:18:12.918Z",
    "dateUpdated": "2026-05-04T12:56:25.514Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}