LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-40316

CVE-2026-40316 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 15, 2026

OWASP BLT - Remote Code Execution

Published: April 15, 2026Updated: April 15, 2026Remote Exploitable

Overview

OWASP BLT < 2.1.1 contains a remote code execution caused by unsafe use of pull_request_target trigger and importing attacker-controlled Python modules in .github/workflows/regenerate-migrations.yml, letting external contributors execute arbitrary code with GITHUB_TOKEN and repository secrets, exploit requires a maintainer to apply the regenerate-migrations label.

Severity & Score

Severity: High
CVSS Score: 8.8

Impact

External contributors can execute arbitrary code in CI with full repository secrets, leading to secret exfiltration and repository compromise.

Mitigation

Update to version 2.1.1 or later.

Details

CVE ID
CVE-2026-40316
Severity
High
CVSS Score
8.8
Type
remote_code_execution
Status
new

CWE

  • CWE-94

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H