Impact
LiveCodes’ i18n-update-pull GitHub Actions workflow injects the pull request title into a JavaScript block that runs under the CI bot token. This flaw allows an attacker to craft a PR title that contains arbitrary JavaScript, enabling the attacker to execute code with the privileges of the CI bot. The attacker can exfiltrate repository secrets, modify code, or perform unauthorized GitHub API operations, compromising confidentiality, integrity, and potentially availability of the affected repositories. The underlying weakness is described by CWE‑94, highlighting improper handling of untrusted input in code generation contexts.
Affected Systems
The affected product is LiveCodes (live-codes:livecodes). All releases that include the i18n‑update‑pull workflow before commit e151c64c2bd80d2d53ac1333f1df9429fe6a1a11 contain the vulnerability. Upgrades to or later than that commit contain the fix.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity, but the EPSS score of less than 1 % suggests that exploitation is currently unlikely. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the attacker to open a pull request; the attack vector is remote via GitHub’s web interface or API. If exploited, the attacker can leverage the CI bot’s token to gain full control over the repository, posing significant risk to any organization using the default workflow configuration.
OpenCVE Enrichment