Impact
The vulnerability in the OWASP BLT workflow permits attacker-supplied Python code to run when a pull request is processed. The workflow, defined in .github/workflows/regenerate-migrations.yml, pulls the submitter’s site models file into the trusted runner environment and runs Django’s makemigrations command. During import of models.py any top-level statements are evaluated, allowing the attacker to execute arbitrary code with the full privileges of the CI job. This code runs under a user token that has write access to the repository and all repository secrets, enabling secret exfiltration, repository tampering, or supply‑chain injection.
Affected Systems
This flaw affects all instances of the OWASP BLT platform running versions earlier than 2.1.1. The product is identified by the vendor OWASP‑BLT:BLT and the vulnerable workflow exists in the public GitHub repository that hosts the project
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity level. The EPSS value is unavailable, but the vulnerability is known to the community and is not listed in the CISA Known Exploit Vulnerabilities catalog. Remote code execution is achieved only when a maintainer applies the regenerate‑migrations label to the pull request. Therefore the attack vector requires an external contributor to open a pull request and a maintainer to apply the label, after which the attacker can run code in the privileged CI environment.
OpenCVE Enrichment