CVE-2026-24480

Source
https://cve.org/CVERecord?id=CVE-2026-24480
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24480.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-24480
Aliases
  • GHSA-7h99-4f97-h6rw
Downstream
Published
2026-01-27T00:32:04.725Z
Modified
2026-01-28T06:11:15.841232Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
QGIS had validated RCE and Repository Takeover via GitHub Actions
Details

QGIS is a free, open source, cross platform geographical information system (GIS) The repository contains a GitHub Actions workflow called "pre-commit checks" that, before commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, was vulnerable to remote code execution and repository compromise because it used the pull_request_target trigger and then checked out and executed untrusted pull request code in a privileged context. Workflows triggered by pull_request_target ran with the base repository's credentials and access to secrets. If these workflows then checked out and executed code from the head of an external pull request (which could have been attacker controlled), the attacker could have executed arbitrary commands with elevated privileges. This insecure pattern has been documented as a security risk by GitHub and security researchers. Commit 76a693cd91650f9b4e83edac525e5e4f90d954e9 removed the vulnerable code.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24480.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-863"
    ]
}
References

Affected packages

Git / github.com/qgis/qgis

Affected ranges

Type
GIT
Repo
https://github.com/qgis/qgis
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

Before-merge-new_vector_api
final-1_8_0

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24480.json"