Impact
A vulnerable GitHub Actions workflow in the QGIS repository allowed arbitrary code execution and potential repository takeover. The workflow used the pull_request_target trigger, which runs with repository secrets and elevated privileges, and it checked out and executed code from the head of an external pull request. This pattern gave an attacker the ability to run any commands on the CI environment and gain access to secrets or modify repository content, reflecting a classic example of executing untrusted code with privileged access (CWE‑863). The vulnerability would let an adversary compromise the integrity and confidentiality of the repository and any downstream services.
Affected Systems
The vulnerability existed in the QGIS project’s GitHub Actions workflow named "pre‑commit checks" prior to the commit identified by 76a693cd91650f9b4e83edac525e5e4f90d954e9. All ongoing builds that employed that workflow before the commit were potentially impacted. No specific QGIS package version was cited, but any clone or fork potentially incorporating the vulnerable workflow before the fix was at risk.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, but the EPSS score of less than 1% suggests a currently low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require the attacker to submit a pull request to the repository; the GitHub Actions workflow would then run with the repository’s credentials, allowing the attacker to execute arbitrary code, leak secrets, or alter the code base.
OpenCVE Enrichment