Arbitrary Command Injection in Prefect GitHub Integration
CVE-2026-3515

8.5HIGH

Key Information:

Vendor

Prefecthq

Vendor
CVE Published:
24 May 2026

What is CVE-2026-3515?

A flaw in the GitHubRepository block of the prefect-github integration in Prefect version 3.6.18 permits attackers to inject arbitrary git command-line options through the reference field. This field is improperly sanitized and concatenated directly into a git clone command string, which can be exploited to manipulate git operations. This vulnerability can lead to serious security implications including Server-Side Request Forgery (SSRF), unauthorized access to credentials, and the potential for remote code execution (RCE) via the compromised aget_directory() and get_directory() methods. Notably, this vulnerability is specific to the Prefect GitHub integration and does not affect the GitLab and BitBucket integrations that utilize a safer command construction method.

Affected Version(s)

prefecthq/prefect <= unspecified

References

CVSS V3.0

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.