DEBIAN-CVE-2026-31900

Source
https://security-tracker.debian.org/tracker/CVE-2026-31900
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31900.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-31900
Upstream
Published
2026-03-11T20:16:15.960Z
Modified
2026-04-28T20:31:34.679692Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Black is the uncompromising Python code formatter. Black provides a GitHub action for formatting code. This action supports an option, use_pyproject: true, for reading the version of Black to use from the repository pyproject.toml. A malicious pull request could edit pyproject.toml to use a direct URL reference to a malicious repository. This could lead to arbitrary code execution in the context of the GitHub Action. Attackers could then gain access to secrets or permissions available in the context of the action. Version 26.3.0 fixes this vulnerability.

References

Affected packages

Debian:11 / black

Package

Name
black
Purl
pkg:deb/debian/black?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*
20.8b1-4
21.*
21.4b2-1~exp1
21.4b2-1
21.4b2-2
21.4b2-3
21.10b0-1
21.12b0-1
22.*
22.1.0-1
22.3.0-1
22.6.0-1
22.6.0-2
22.8.0-1
22.10.0-1
22.10.0-2
22.12.0-1
23.*
23.1.0-1
23.3.0-1~exp1
23.3.0-1
23.7.0-1
23.9.1-1
23.10.0-1
23.10.1-1
23.11.0-1
24.*
24.1.1-1
24.2.0-1
24.4.0-1
24.4.0-2
24.4.2-1
24.4.2-2~0exp0
24.4.2-2
24.8.0-1
24.10.0-1
24.10.0-2
24.10.0-3
25.*
25.1.0-0exp
25.1.0-1
25.1.0-2
25.1.0-3
25.9.0-1
25.11.0-1
25.12.0-1
25.12.0-2
26.*
26.1.0-1
26.3.1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31900.json"

Debian:12 / black

Package

Name
black
Purl
pkg:deb/debian/black?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

23.*
23.1.0-1
23.3.0-1~exp1
23.3.0-1
23.7.0-1
23.9.1-1
23.10.0-1
23.10.1-1
23.11.0-1
24.*
24.1.1-1
24.2.0-1
24.4.0-1
24.4.0-2
24.4.2-1
24.4.2-2~0exp0
24.4.2-2
24.8.0-1
24.10.0-1
24.10.0-2
24.10.0-3
25.*
25.1.0-0exp
25.1.0-1
25.1.0-2
25.1.0-3
25.9.0-1
25.11.0-1
25.12.0-1
25.12.0-2
26.*
26.1.0-1
26.3.1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31900.json"

Debian:13 / black

Package

Name
black
Purl
pkg:deb/debian/black?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

25.*
25.1.0-3
25.9.0-1
25.11.0-1
25.12.0-1
25.12.0-2
26.*
26.1.0-1
26.3.1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31900.json"

Debian:14 / black

Package

Name
black
Purl
pkg:deb/debian/black?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

25.*
25.1.0-3
25.9.0-1
25.11.0-1
25.12.0-1
25.12.0-2
26.*
26.1.0-1
26.3.1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31900.json"