Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pallets Click
Pallets Click click |
|
| Vendors & Products |
Pallets Click
Pallets Click click |
Thu, 30 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Palletsprojects
Palletsprojects click |
|
| CPEs | cpe:2.3:a:palletsprojects:click:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Palletsprojects
Palletsprojects click |
Thu, 30 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Thu, 30 Apr 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pallets Click, versions 8.3.2 and below, contain a command injection vulnerability in the click.edit() function, allowing attackers to pass arbitrary OS commands from an unprivileged account. | |
| Title | Pallets Click contains a command injection via Unsanitized Filename "click.edit()" | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-05-07T16:41:32.372Z
Reserved: 2026-04-27T17:37:48.878Z
Link: CVE-2026-7246
Updated: 2026-04-30T13:38:01.428Z
Status : Analyzed
Published: 2026-04-30T14:16:36.433
Modified: 2026-04-30T16:39:47.257
Link: CVE-2026-7246
OpenCVE Enrichment
Updated: 2026-05-04T13:45:25Z