CVE-2026-27941

OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the `pull_request_target` event while checking out and executing untrusted code from forked pull requests. These workflows run with the security context of the base repository, including a write-privileged `GITHUB_TOKEN` and numerous sensitive secrets (API keys, database/vector store tokens, and a Google Cloud service account key). Version 1.37.1 contains a fix.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openlit:openlit_software_development_kit:*:*:*:*:*:python:*:*

History

No history.

Information

Published : 2026-02-26 02:16

Updated : 2026-03-06 20:06


NVD link : CVE-2026-27941

Mitre link : CVE-2026-27941

CVE.ORG link : CVE-2026-27941


JSON object : View

Products Affected

openlit

  • openlit_software_development_kit
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere