CVE-2026-7246
Published: 30 April 2026
Summary
CVE-2026-7246 is a high-severity Command Injection (CWE-77) vulnerability in Palletsprojects Click. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 8.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the command injection vulnerability in Click's click.edit() function by requiring timely patching to version 8.3.3.
Prevents command injection by validating untrusted inputs passed to click.edit() to block arbitrary OS command execution.
Enforces least privilege to restrict the scope of arbitrary commands executable even if the vulnerability is exploited from a high-privilege context.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection vulnerability directly enables arbitrary OS command execution on local system with user interaction, mapping to T1203 Exploitation for Client Execution and T1059 Command and Scripting Interpreter.
NVD Description
Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account.
Deeper analysisAI
CVE-2026-7246 is a command injection vulnerability (CWE-77) affecting Pallets Click versions 8.3.2 and below, specifically in the click.edit() function. This flaw enables attackers to execute arbitrary operating system commands. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H) and was published on 2026-04-30.
Exploitation requires local access (AV:L), high attack complexity (AC:H), elevated privileges (PR:H), and user interaction (UI:R). Despite the description noting execution from an unprivileged account, the CVSS metrics indicate high privileges are needed. Successful attacks can achieve high confidentiality, integrity, and availability impacts (C:I:A:H) with changed scope (S:C), potentially leading to full system compromise via arbitrary command execution.
Mitigation is addressed in the release of Click version 8.3.3, available at https://github.com/pallets/click/releases/tag/8.3.3. Additional details are provided in GitHub Security Advisories GHSA-47fr-3ffg-hgmw at https://github.com/tsigouris007/security-advisories/security/advisories/GHSA-47fr-3ffg-hgmw. Security practitioners should upgrade to the patched version and review the advisories for further guidance.
Details
- CWE(s)