Description
python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all process-level secrets in a single tool call. This vulnerability is fixed in 1.1.3.
Published: 2026-05-14
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in python-utcp occurs when the _prepare_environment() function copies a full copy of the process environment (os.environ) into each CLI subprocess before version 1.1.3. When combined with a related command‑injection issue (CVE‑2026‑45369), an attacker can execute a single tool call that leaks all secrets stored in the environment. The result is the compromise of confidential data, such as API keys, passwords, or other sensitive credentials, without requiring direct access to the host machine.

Affected Systems

The universal‑tool‑calling‑protocol python‑utcp library, versions prior to 1.1.3, is affected. Users should verify the version of python‑utcp installed and identify any deployments using 1.1.2 or earlier.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity risk. While no EPSS score is publicly available, the potential for secrets exfiltration makes the vulnerability attractive to attackers. It is not currently listed in the CISA KEV catalog. The likely attack vector is through exploitation of the underlying command injection that allows an adversary to invoke python‑utcp in a manner that triggers the environment‑copying behavior. If an attacker can influence the CLI invocation, the exposure of the full environment facilitates large‑scale secrets leakage.

Generated by OpenCVE AI on May 14, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade python‑utcp to version 1.1.3 or later, which removes the full environment copy from CLI subprocesses.
  • Configure the environment to expose only essential variables before running the tool, ensuring that sensitive values are not present in os.environ when possible.
  • Apply input validation on command arguments to prevent command injection that could be combined with the environment exposure flaw.

Generated by OpenCVE AI on May 14, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5v57-8rxj-3p2r python-utcp: Full Process Environment Exposed to CLI Subprocess - Secrets Leakage via Command Injection
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all process-level secrets in a single tool call. This vulnerability is fixed in 1.1.3.
Title python-utcp: Full Process Environment Exposed to CLI Subprocess - Secrets Leakage via Command Injection
Weaknesses CWE-526
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T11:23:57.596Z

Reserved: 2026-05-12T00:51:29.085Z

Link: CVE-2026-45370

cve-icon Vulnrichment

Updated: 2026-05-15T11:23:29.479Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T21:16:48.350

Modified: 2026-05-15T14:55:57.710

Link: CVE-2026-45370

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T21:30:12Z

Weaknesses