CVE-2026-45370: CWE-526: Cleartext Storage of Sensitive Information in an Environment Variable in universal-tool-calling-protocol python-utcp
CVE-2026-45370 is a high-severity vulnerability in python-utcp versions prior to 1. 1. 3 where the function _prepare_environment() passes a full copy of the process environment variables to every CLI subprocess. This results in cleartext storage of sensitive information in environment variables being exposed to subprocesses. When combined with CVE-2026-45369, it allows an attacker to exfiltrate all process-level secrets in a single tool call. The vulnerability is fixed in version 1. 1. 3.
AI Analysis
Technical Summary
The vulnerability in python-utcp (universal-tool-calling-protocol) arises from the _prepare_environment() function in cli_communication_protocol.py passing a complete copy of os.environ to every CLI subprocess. This behavior causes sensitive environment variables to be exposed in cleartext to subprocesses, violating secure handling of secrets (CWE-526). The issue affects versions prior to 1.1.3 and can be exploited in conjunction with CVE-2026-45369 to exfiltrate all process-level secrets. The fix was introduced in version 1.1.3.
Potential Impact
An attacker with the ability to invoke CLI subprocesses can access all environment variables containing sensitive information, potentially leading to the disclosure of secrets. The vulnerability does not impact integrity or availability but has a high confidentiality impact. No known exploits are reported in the wild at this time.
Mitigation Recommendations
Upgrade python-utcp to version 1.1.3 or later, where this vulnerability is fixed. Since the vendor advisory confirms the fix in 1.1.3, applying this official update fully mitigates the issue. No additional mitigations are indicated.
CVE-2026-45370: CWE-526: Cleartext Storage of Sensitive Information in an Environment Variable in universal-tool-calling-protocol python-utcp
Description
CVE-2026-45370 is a high-severity vulnerability in python-utcp versions prior to 1. 1. 3 where the function _prepare_environment() passes a full copy of the process environment variables to every CLI subprocess. This results in cleartext storage of sensitive information in environment variables being exposed to subprocesses. When combined with CVE-2026-45369, it allows an attacker to exfiltrate all process-level secrets in a single tool call. The vulnerability is fixed in version 1. 1. 3.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability in python-utcp (universal-tool-calling-protocol) arises from the _prepare_environment() function in cli_communication_protocol.py passing a complete copy of os.environ to every CLI subprocess. This behavior causes sensitive environment variables to be exposed in cleartext to subprocesses, violating secure handling of secrets (CWE-526). The issue affects versions prior to 1.1.3 and can be exploited in conjunction with CVE-2026-45369 to exfiltrate all process-level secrets. The fix was introduced in version 1.1.3.
Potential Impact
An attacker with the ability to invoke CLI subprocesses can access all environment variables containing sensitive information, potentially leading to the disclosure of secrets. The vulnerability does not impact integrity or availability but has a high confidentiality impact. No known exploits are reported in the wild at this time.
Mitigation Recommendations
Upgrade python-utcp to version 1.1.3 or later, where this vulnerability is fixed. Since the vendor advisory confirms the fix in 1.1.3, applying this official update fully mitigates the issue. No additional mitigations are indicated.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-05-12T00:51:29.085Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a0635daec166c07b010dd3a
Added to database: 5/14/2026, 8:51:38 PM
Last enriched: 5/14/2026, 9:06:34 PM
Last updated: 5/14/2026, 10:04:28 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.