CVE-2026-27701 PUBLISHED

LiveCodes vulnerable to JavaScript Injection via untrusted PR title in i18n-update-pull workflow

Assigner: GitHub_M
Reserved: 23.02.2026 Published: 25.02.2026 Updated: 25.02.2026

LiveCode is an open-source, client-side code playground. Prior to commit e151c64c2bd80d2d53ac1333f1df9429fe6a1a11, LiveCode's i18n-update-pull GitHub Actions workflow is vulnerable to JavaScript injection. The title of the Pull Request associated with the triggering issue comment is interpolated directly into a actions/github-script JavaScript block using a GitHub Actions template expression. An attacker who opens a PR with a crafted title can inject arbitrary JavaScript that executes with the privileges of the CI bot token (CI_APP_ID / CI_APP_PRIVATE_KEY), enabling exfiltration of repository secrets and unauthorized GitHub API operations. Commit e151c64c2bd80d2d53ac1333f1df9429fe6a1a11 fixes the issue.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
CVSS Score: 8.8

Product Status

Vendor live-codes
Product livecodes
Versions
  • Version < e151c64c2bd80d2d53ac1333f1df9429fe6a1a11 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE