CVE-2026-3515 PUBLISHED

Argument Injection in prefecthq/prefect

Assigner: @huntr_ai
Reserved: 04.03.2026 Published: 24.05.2026 Updated: 24.05.2026

A vulnerability in the GitHubRepository block of the prefect-github integration in Prefect version 3.6.18 allows an attacker to inject arbitrary git command-line options via the reference field. The reference field is concatenated directly into a git clone command string without proper sanitization, and then parsed by shlex.split(). This enables injection of options such as -c, leading to potential Server-Side Request Forgery (SSRF), credential theft, or remote code execution (RCE). The vulnerability affects both the aget_directory() and get_directory() methods in src/integrations/prefect-github/prefect_github/repository.py. This issue does not affect the GitLab and BitBucket integrations, which use a safer list-based command construction approach.

Metrics

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
CVSS Score: 8.5

Product Status

Vendor prefecthq
Product prefecthq/prefect
Versions
  • affected from unspecified to latest (incl.)

References

Problem Types

  • CWE-88 Improper Neutralization of Argument Delimiters in a Command CWE