Description
OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Prior to 2.1.2, .github/workflows/pre-commit-fix.yaml uses pull_request_target (privileged trigger) but checks out and executes code directly from the attacker's fork, enabling RCE with write permissions. This vulnerability is fixed in 2.1.2.
Published: 2026-05-11
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OWASP BLT versions prior to 2.1.2 contain a workflow definition that uses the GitHub Actions trigger pull_request_target, which runs with the repository’s privileges. The workflow file pre-commit-fix.yaml checks out and executes code directly from any forked repository, allowing an attacker who owns a fork, but only has write access to the default branch, to inject malicious code into the workflow runtime. This flaw provides attackers the ability to run arbitrary commands on the workflow runner and compromise the entire CI environment, leading to full system control, data theft, and deployment of malware. The weakness is an unchecked code execution path (CWE‑94) with an uncontrolled remote execution source (CWE‑95).

Affected Systems

The vulnerability applies to the OWASP-BLT project named BLT in versions earlier than 2.1.2. No specific patch versions are supplied beyond the corrective release 2.1.2; systems using the earlier workflow configuration are at risk.

Risk and Exploitability

The CVSS score of 8.8 demonstrates a high severity for this flaw, and the lack of an EPSS score means the exact exploit probability is unknown, though the high CVSS indicates a serious risk. The issue is not yet listed in the CISA KEV catalog. Based on the description, the most likely attack vector is a pull request to a fork of the repository that triggers the privileged workflow; the attacker must have write access to the fork to add malicious code. Once triggered, the workflow runner will execute the injected code with repository permissions, enabling remote code execution.

Generated by OpenCVE AI on May 11, 2026 at 17:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OWASP BLT to version 2.1.2 or newer, which removes the use of pull_request_target for the pre-commit-fix workflow
  • Review and replace any remaining Pull Request Target triggers in custom workflows with pull_request or other non‑privileged events
  • Limit write access on forks and enforce code review policies to prevent malicious code from being merged into forked branches

Generated by OpenCVE AI on May 11, 2026 at 17:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Owasp-blt
Owasp-blt blt
Vendors & Products Owasp-blt
Owasp-blt blt

Mon, 11 May 2026 16:30:00 +0000

Type Values Removed Values Added
Description OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Prior to 2.1.2, .github/workflows/pre-commit-fix.yaml uses pull_request_target (privileged trigger) but checks out and executes code directly from the attacker's fork, enabling RCE with write permissions. This vulnerability is fixed in 2.1.2.
Title OWASP BLT: pre-commit-fix.yaml executes untrusted fork code via pull_request_target
Weaknesses CWE-94
CWE-95
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-11T17:27:55.699Z

Reserved: 2026-04-29T00:31:15.725Z

Link: CVE-2026-42603

cve-icon Vulnrichment

Updated: 2026-05-11T17:27:45.536Z

cve-icon NVD

Status : Received

Published: 2026-05-11T17:16:33.410

Modified: 2026-05-11T18:16:35.887

Link: CVE-2026-42603

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T17:45:26Z

Weaknesses