Description
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. In versions 2.10.0 and prior, Litestar's `docs-preview.yml` workflow is vulnerable to Environment Variable injection which may lead to secret exfiltration and repository manipulation. This issue grants a malicious actor the permission to write issues, read metadata, and write pull requests. In addition, the `DOCS_PREVIEW_DEPLOY_TOKEN` is exposed to the attacker. Commit 84d351e96aaa2a1338006d6e7221eded161f517b contains a fix for this issue.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/litestar-org/litestar/security/advisories/GHSA-4hq2-rpgc-r8r7
Patch x_refsource_misc
https://github.com/litestar-org/litestar/commit/84d351e96aaa2a1338006d6e7221eded161f517b
Various Sources x_refsource_misc
https://github.com/litestar-org/litestar/actions/runs/10081936962/job/27875077668#step:1:17
Scores
CVSS v3
8.3
EPSS
0.0098
EPSS Percentile
76.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-78
Status
published
Products (2)
litestar-org/litestar
<= 2.10.0
pypi/litestar
0PyPI
Published
Aug 12, 2024
Tracked Since
Feb 18, 2026