Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openlit openlit Software Development Kit
|
|
| CPEs | cpe:2.3:a:openlit:openlit_software_development_kit:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Openlit openlit Software Development Kit
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openlit
Openlit openlit |
|
| Vendors & Products |
Openlit
Openlit openlit |
Thu, 26 Feb 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the `pull_request_target` event while checking out and executing untrusted code from forked pull requests. These workflows run with the security context of the base repository, including a write-privileged `GITHUB_TOKEN` and numerous sensitive secrets (API keys, database/vector store tokens, and a Google Cloud service account key). Version 1.37.1 contains a fix. | |
| Title | OpenLIT Vulnerable to Remote Code Execution and Secret Exposure via Misuse of `pull_request_target` in GitHub Actions Workflows | |
| Weaknesses | CWE-829 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T15:54:11.519Z
Reserved: 2026-02-25T03:11:36.689Z
Link: CVE-2026-27941
No data.
Status : Analyzed
Published: 2026-02-26T02:16:22.160
Modified: 2026-03-06T20:06:09.357
Link: CVE-2026-27941
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:45:21Z