CVE-2026-42603 PUBLISHED

OWASP BLT: pre-commit-fix.yaml executes untrusted fork code via pull_request_target

Assigner: GitHub_M
Reserved: 29.04.2026 Published: 11.05.2026 Updated: 11.05.2026

OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Prior to 2.1.2, .github/workflows/pre-commit-fix.yaml uses pull_request_target (privileged trigger) but checks out and executes code directly from the attacker's fork, enabling RCE with write permissions. This vulnerability is fixed in 2.1.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor OWASP-BLT
Product BLT
Versions
  • Version < 2.1.2 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE
  • CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') CWE