CVE-2026-27941 - OpenLIT Vulnerable to Remote Code Execution and Secret Exposure via Misuse of `p...

CVE-2026-27941 - OpenLIT Vulnerable to Remote Code Execution and Secret Exposure via Misuse of `p...

CVE ID : CVE-2026-27941 Published : Feb. 26, 2026, 2:16 a.m. | 50 minutes ago Description : OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the `pull_request_target` event while checking out and executing untrusted code from forked pull requests. These workflows run with the security context of the base repository, including a write-privileged `GITHUB_TOKEN` and numerous sensitive secrets (API keys, database/vector store tokens, and a Google Cloud service account key). Version 1.37.1 contains a fix. Severity: 9.9 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
CRITICAL
Published
Feb. 26, 2026
Affected Product: GitHub