Impact
Prefect HQ's Prefect software versions up to 3.6.21 contain a flaw in the Health Check API endpoint /api/health. By manipulating the endswith function the attacker can bypass authentication controls and gain remote access. Public exploit code is available, and the vulnerability has not yet been listed in CISA’s KEV catalog. A patch in commit e21617125335025b4b27e7d6f0ca028e8e8f3b79 was released in version 3.6.22 to fix the issue.
Affected Systems
This issue affects PrefectHQ Prefect versions up to and including 3.6.21. Users running any of those releases are vulnerable until they upgrade to 3.6.22 or later.
Risk and Exploitability
The flaw has a CVSS score of 6.9, indicating moderate severity. The attack can be carried out remotely from anywhere that can reach the API endpoint. Public exploit code is available, and the vulnerability is not currently listed in CISA’s KEV catalog. The EPSS score is less than 1%, implying a low probability of exploitation, but the presence of a public exploit raises the risk for exposed deployments.
OpenCVE Enrichment