JustAppSec
Back to news

OpenLIT patches critical GitHub Actions pull_request_target secret exposure

1 min readPublished 26 Feb 2026Source: CVE Project (cvelistV5)

TL;DR — OpenLIT's GitHub Actions workflows used pull_request_target with untrusted fork code, exposing repository secrets and privileged tokens to external contributors.

What happened

OpenLIT is an open-source observability platform for monitoring LLM applications and GPU infrastructure. CVE-2026-27941 describes a critical vulnerability in several OpenLIT GitHub Actions workflows that used pull_request_target while checking out and executing untrusted code from forked pull requests. This caused workflows to run in the base repository's security context, exposing a write-privileged GITHUB_TOKEN and sensitive secrets including API keys, database tokens, and a Google Cloud service account key.

The pull_request_target + checkout-of-PR-code antipattern is one of the most common CI/CD security mistakes in open source — this is the same class of issue that led to the OpenSSF Siren advisory on hackerbot-claw automated exploitation.

Who is impacted

  • Repositories using OpenLIT versions < 1.37.1.
  • Environments where the affected workflows run and can be triggered via forked pull requests.

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing.
  • Review all GitHub Actions workflows for unsafe pull_request_target usage combined with checkout/execution of PR code.
  • If you suspect exposure, rotate GitHub Actions secrets and any credentials referenced by workflows.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.