Back to list

python-utcp: Full Process Environment Exposed to CLI Subprocess - Secrets Leakage via Command Injection — CVE-2026-45370

GHSA · GitHub · CVE-2026-45370

ID
CVE-2026-45370
Date
Activity
Source
GHSA
Vendor
GitHub
Threat
high
CVSS
7.7

Summary

## Summary `_prepare_environment()` in `cli_communication_protocol.py` passes a full copy of `os.environ` to every CLI subprocess. When combined with the Command Injection vulnerability (CWE-78) in `_substitute_utcp_args()` tracked as GHSA-33p6-5jxp-p3x4, an attacker can exfiltrate all process-level secrets in a single tool call. ## Vulnerable Code ```python # cli_communication_protocol.py def…

Product

pip: utcp-cli

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories