Vulnerability DatabaseGHSA-j4g3-3q8x-jxqp

GHSA-j4g3-3q8x-jxqp
Python vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-j4g3-3q8x-jxqp) affects dbt-core versions 1.7.0 to 1.7.3 and involves the exposure of sensitive information where Personal Access Tokens (PATs) used for accessing private repositories are written in plaintext to the package-lock.yml file. The issue was discovered and disclosed on December 8, 2023, affecting the dbt-core package distributed through pip (GitHub Advisory).

Technical details

The vulnerability has been assigned a CVSS score of 3.2 (Low severity) with the following characteristics: Local attack vector, Low attack complexity, Low privileges required, User interaction Required, Changed scope, Low confidentiality impact, and No impact on integrity or availability. The CVSS string is CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N. The issue specifically occurs when dbt-core is used to pull source code from private repositories using PATs, where these tokens are inadvertently exposed in the package-lock.yml file (GitHub Advisory).

Impact

The primary impact of this vulnerability is the potential exposure of Personal Access Tokens used for accessing private repositories. When these tokens are written in plaintext to the package-lock.yml file, they could be exposed if the file is shared or stored in version control systems, potentially leading to unauthorized access to private repositories (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in dbt-core version 1.7.3. Users are advised to upgrade to this version or later. For immediate mitigation, users should: 1) Remove any git URLs containing plaintext secrets from package-lock.yml files on servers, workstations, or in source control, and 2) Rotate any tokens that may have been written to version-controlled files (GitHub Advisory, Release Notes).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23949HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 20, 2026
CVE-2026-22219HIGH8.3
  • PythonPython
  • chainlit
NoYesJan 20, 2026
CVE-2026-23842HIGH7.5
  • PythonPython
  • chatterbot
NoYesJan 19, 2026
CVE-2026-23877MEDIUM5.3
  • PythonPython
  • swingmusic
NoYesJan 19, 2026
CVE-2026-23833LOW1.7
  • PythonPython
  • esphome
NoYesJan 19, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management