CVE-2026-7246 - High Severity Vulnerability
Vulnerable Library - click-7.1.2-py2.py3-none-any.whl
Composable command line interface toolkit
Library home page: https://files.pythonhosted.org/packages/d2/3d/fa76db83bf75c4f8d338c2fd15c8d33fdd7ad23a9b5e57eb6c5de26b430e/click-7.1.2-py2.py3-none-any.whl
Path to dependency file: /doctest/requirements.txt
Path to vulnerable library: /tmp/ws-ua_20260515210359_ZXTHVI/python_KDGUJF/202605152104001/env/lib/python3.10/site-packages/click-7.1.2.dist-info
Dependency Hierarchy:
- ❌ click-7.1.2-py2.py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: 743d51f1c7752fdbc962f9cd3fe502e285adbbed
Found in base branch: main
Vulnerability Details
Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2026-04-30
URL: CVE-2026-7246
CVSS 3 Score Details (7.2)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-30
Fix Resolution: https://github.com/pallets/click.git - 8.3.3,click - 8.3.3
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2026-7246 - High Severity Vulnerability
Composable command line interface toolkit
Library home page: https://files.pythonhosted.org/packages/d2/3d/fa76db83bf75c4f8d338c2fd15c8d33fdd7ad23a9b5e57eb6c5de26b430e/click-7.1.2-py2.py3-none-any.whl
Path to dependency file: /doctest/requirements.txt
Path to vulnerable library: /tmp/ws-ua_20260515210359_ZXTHVI/python_KDGUJF/202605152104001/env/lib/python3.10/site-packages/click-7.1.2.dist-info
Dependency Hierarchy:
Found in HEAD commit: 743d51f1c7752fdbc962f9cd3fe502e285adbbed
Found in base branch: main
Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2026-04-30
URL: CVE-2026-7246
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Type: Upgrade version
Release Date: 2026-04-30
Fix Resolution: https://github.com/pallets/click.git - 8.3.3,click - 8.3.3
⛑️ Automatic Remediation will be attempted for this issue.