Back to VulnFeed / CVE-2026-7246
root@hackertop:~/vulnfeed/CVE-2026-7246#
CVE-2026-7246 MEDIUM Command Injection ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Pallets Click up to 8.3.2 click.edit command injection

Click 21d ago Impact pending confirmation
LIFECYCLE
6.0 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability classified as critical was found in Pallets Click up to 8.3.2. Affected by this vulnerability is the function click.edit. Upgrading to version 8.3.3 eliminates this vulnerability.
Root Cause Analysis
The CWE definition for the vulnerability is CWE-77. The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

Impact: As an impact it is known to affect confidentiality, integrity, and availability.

Countermeasure: Upgrading to version 8.3.3 eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7246 · CVSS 6.0 · Active Threat