Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5v57-8rxj-3p2r | python-utcp: Full Process Environment Exposed to CLI Subprocess - Secrets Leakage via Command Injection |
Fri, 15 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all process-level secrets in a single tool call. This vulnerability is fixed in 1.1.3. | |
| Title | python-utcp: Full Process Environment Exposed to CLI Subprocess - Secrets Leakage via Command Injection | |
| Weaknesses | CWE-526 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T11:23:57.596Z
Reserved: 2026-05-12T00:51:29.085Z
Link: CVE-2026-45370
Updated: 2026-05-15T11:23:29.479Z
Status : Deferred
Published: 2026-05-14T21:16:48.350
Modified: 2026-05-15T14:55:57.710
Link: CVE-2026-45370
No data.
OpenCVE Enrichment
Updated: 2026-05-14T21:30:12Z
Github GHSA