Description
OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the `pull_request_target` event while checking out and executing untrusted code from forked pull requests. These workflows run with the security context of the base repository, including a write-privileged `GITHUB_TOKEN` and numerous sensitive secrets (API keys, database/vector store tokens, and a Google Cloud service account key). Version 1.37.1 contains a fix.
Published: 2026-02-26
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is caused by the misuse of the GitHub Actions "pull_request_target" event in several workflows prior to version 1.37.1. When a pull request is opened from a forked repository, the workflow runs with the security context of the base repository, which includes a write‑privileged GITHUB_TOKEN and access to many sensitive secrets such as API keys, database tokens, and a Google Cloud service account key. The attacker can supply arbitrary code in the forked pull request, causing that code to be executed under the privileged context of the base repository. This results in remote code execution and secret exposure, enabling the attacker to modify repository contents, deploy malicious code, or exfiltrate confidential credentials.

Affected Systems

Vendors affected include OpenLIT, specifically the OpenLIT Software Development Kit. All releases prior to version 1.37.1 are vulnerable because their GitHub Actions workflows incorrectly use the pull_request_target event.

Risk and Exploitability

The CVSS score of 10 indicates the highest possible severity, while an EPSS score of less than 1% suggests a very low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog, but because the attacker only needs to fork the repository and open a pull request—tasks that require no special credentials—the practical attack vector is wide open to anyone with access to GitHub. Once exploited, an attacker can execute arbitrary code, modify production code, and retrieve all secrets exposed to the workflow. Given the critical impact and the ease of the attack path, it is recommended that affected users apply the vendor fix as soon as possible.

Generated by OpenCVE AI on April 17, 2026 at 14:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenLIT 1.37.1 or later, which removes the use of pull_request_target in the vulnerable workflows.
  • If upgrading immediately is not possible, modify the GitHub Actions configuration to replace pull_request_target with pull_request or another event type that does not run with privileged permissions from forked repos.
  • Rotate any secrets that may have been exposed by the compromised workflows and review repository access permissions to limit who can create pull requests from forks.

Generated by OpenCVE AI on April 17, 2026 at 14:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Openlit openlit Software Development Kit
CPEs cpe:2.3:a:openlit:openlit_software_development_kit:*:*:*:*:*:python:*:*
Vendors & Products Openlit openlit Software Development Kit

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Openlit
Openlit openlit
Vendors & Products Openlit
Openlit openlit

Thu, 26 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the `pull_request_target` event while checking out and executing untrusted code from forked pull requests. These workflows run with the security context of the base repository, including a write-privileged `GITHUB_TOKEN` and numerous sensitive secrets (API keys, database/vector store tokens, and a Google Cloud service account key). Version 1.37.1 contains a fix.
Title OpenLIT Vulnerable to Remote Code Execution and Secret Exposure via Misuse of `pull_request_target` in GitHub Actions Workflows
Weaknesses CWE-829
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Openlit Openlit Openlit Software Development Kit
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T15:54:11.519Z

Reserved: 2026-02-25T03:11:36.689Z

Link: CVE-2026-27941

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-26T02:16:22.160

Modified: 2026-03-06T20:06:09.357

Link: CVE-2026-27941

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:45:21Z

Weaknesses