Cyber Posture

CVE-2026-7246

HighPublic PoC

Published: 30 April 2026

Published
30 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0003 8.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7246 is a high-severity Command Injection (CWE-77) vulnerability in Palletsprojects Click. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 8.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the command injection vulnerability in Click's click.edit() function by requiring timely patching to version 8.3.3.

prevent

Prevents command injection by validating untrusted inputs passed to click.edit() to block arbitrary OS command execution.

prevent

Enforces least privilege to restrict the scope of arbitrary commands executable even if the vulnerability is exploited from a high-privilege context.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection vulnerability directly enables arbitrary OS command execution on local system with user interaction, mapping to T1203 Exploitation for Client Execution and T1059 Command and Scripting Interpreter.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account.

Deeper analysisAI

CVE-2026-7246 is a command injection vulnerability (CWE-77) affecting Pallets Click versions 8.3.2 and below, specifically in the click.edit() function. This flaw enables attackers to execute arbitrary operating system commands. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H) and was published on 2026-04-30.

Exploitation requires local access (AV:L), high attack complexity (AC:H), elevated privileges (PR:H), and user interaction (UI:R). Despite the description noting execution from an unprivileged account, the CVSS metrics indicate high privileges are needed. Successful attacks can achieve high confidentiality, integrity, and availability impacts (C:I:A:H) with changed scope (S:C), potentially leading to full system compromise via arbitrary command execution.

Mitigation is addressed in the release of Click version 8.3.3, available at https://github.com/pallets/click/releases/tag/8.3.3. Additional details are provided in GitHub Security Advisories GHSA-47fr-3ffg-hgmw at https://github.com/tsigouris007/security-advisories/security/advisories/GHSA-47fr-3ffg-hgmw. Security practitioners should upgrade to the patched version and review the advisories for further guidance.

Details

CWE(s)

Affected Products

palletsprojects
click
≤ 8.3.3

CVEs Like This One

CVE-2026-5463Shared CWE-77
CVE-2026-0975Shared CWE-77
CVE-2026-21518Shared CWE-77
CVE-2024-8402Shared CWE-77
CVE-2025-62222Shared CWE-77
CVE-2025-66219Shared CWE-77
CVE-2026-21516Shared CWE-77
CVE-2025-54416Shared CWE-77
CVE-2026-2333Shared CWE-77
CVE-2025-57199Shared CWE-77

References