Skip to content

CVE-2026-7246 (High) detected in click-7.1.2-py2.py3-none-any.whl #5445

@mend-for-github-com

Description

@mend-for-github-com

CVE-2026-7246 - High Severity Vulnerability

Vulnerable Library - click-7.1.2-py2.py3-none-any.whl

Composable command line interface toolkit

Library home page: https://files.pythonhosted.org/packages/d2/3d/fa76db83bf75c4f8d338c2fd15c8d33fdd7ad23a9b5e57eb6c5de26b430e/click-7.1.2-py2.py3-none-any.whl

Path to dependency file: /doctest/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20260522224128_RXDJTC/python_MPSBNA/202605222241291/env/lib/python3.10/site-packages/click-7.1.2.dist-info

Dependency Hierarchy:

  • click-7.1.2-py2.py3-none-any.whl (Vulnerable Library)

Found in HEAD commit: 743d51f1c7752fdbc962f9cd3fe502e285adbbed

Found in base branch: main

Vulnerability Details

Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: 2026-04-30

URL: CVE-2026-7246

CVSS 3 Score Details (7.2)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-30

Fix Resolution: https://github.com/pallets/click.git - 8.3.3,click - 8.3.3


⛑️ Automatic Remediation will be attempted for this issue.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions