9.9
CVE-2026-27941
- EPSS 0.05%
- Veröffentlicht 26.02.2026 01:17:22
- Zuletzt bearbeitet 06.03.2026 20:06:09
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the `pull_request_target` event while checking out and executing untrusted code from forked pull requests. These workflows run with the security context of the base repository, including a write-privileged `GITHUB_TOKEN` and numerous sensitive secrets (API keys, database/vector store tokens, and a Google Cloud service account key). Version 1.37.1 contains a fix.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Openlit ≫ Openlit Software Development Kit SwPlatformpython Version >= 1.36.2 < 1.37.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.145 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-advisories@github.com | 9.9 | 3.1 | 6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.