Unrated severityNVD Advisory· Published Feb 26, 2026· Updated Feb 26, 2026
OpenLIT Vulnerable to Remote Code Execution and Secret Exposure via Misuse of `pull_request_target` in GitHub Actions Workflows
CVE-2026-27941
Description
OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the pull_request_target event while checking out and executing untrusted code from forked pull requests. These workflows run with the security context of the base repository, including a write-privileged GITHUB_TOKEN and numerous sensitive secrets (API keys, database/vector store tokens, and a Google Cloud service account key). Version 1.37.1 contains a fix.
Affected products
2- openlit/openlitv5Range: < 1.37.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/openlit/openlit/commit/4a62039a1659d6cbb8913172693f587b5fc2546cmitrex_refsource_MISC
- github.com/openlit/openlit/security/advisories/GHSA-9jgv-x8cq-296qmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.