CVE-2026-27941

CRITICAL

OpenLIT <1.37.1 - Privilege Escalation

Title source: llm
STIX 2.1

Description

OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the `pull_request_target` event while checking out and executing untrusted code from forked pull requests. These workflows run with the security context of the base repository, including a write-privileged `GITHUB_TOKEN` and numerous sensitive secrets (API keys, database/vector store tokens, and a Google Cloud service account key). Version 1.37.1 contains a fix.

Scores

CVSS v3 9.9
EPSS 0.0006
EPSS Percentile 18.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-829
Status published
Products (1)
openlit/openlit_software_development_kit 1.36.2 - 1.37.1
Published Feb 26, 2026
Tracked Since Feb 26, 2026