OWASP BLT RCE: GitHub Workflow Flaw Exposes Secrets

OWASP BLT RCE: GitHub Workflow Flaw Exposes Secrets

The National Vulnerability Database (NVD) has detailed a critical Remote Code Execution (RCE) vulnerability, CVE-2026-40316, affecting OWASP BLT versions prior to 2.1.1. OWASP BLT, a platform used for QA testing and vulnerability disclosure across various digital assets, is exposed due to a flaw in its .github/workflows/regenerate-migrations.yml workflow. This particular workflow, designed to regenerate migrations, inadvertently creates a backdoor for arbitrary code execution.

The core issue lies in the workflow’s use of the pull_request_target trigger, which grants full GITHUB_TOKEN write permissions. According to the NVD, the workflow copies attacker-controlled files from untrusted pull requests into the trusted runner workspace via git show. Subsequently, it executes python manage.py makemigrations, which imports Django model modules, including an attacker-controlled website/models.py. Any malicious Python code within this models.py is executed during import, granting arbitrary code execution within the privileged CI environment. This provides access to GITHUB_TOKEN and repository secrets, a serious red flag for supply chain integrity.

This attack vector is particularly concerning because any external contributor can initiate it by opening a pull request. The only additional step required is for a maintainer to apply the regenerate-migrations label. This could lead to severe consequences, including secret exfiltration, complete repository compromise, and broader supply chain attacks. A patch is anticipated in version 2.1.1, and the NVD has assigned a CVSS score of 8.8 (HIGH) to this vulnerability, highlighting its severity and potential impact.

Related ATT&CK Techniques

🛡️ Detection Rules

1 rules · 6 SIEM formats

1 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.

high vulnerability event-type

Exploitation Attempt — CVE-2026-40316

✓ Sigma 🔒 Splunk SPL 🔒 Sentinel KQL 🔒 Elastic 🔒 QRadar AQL 🔒 Wazuh

Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.

1 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get All SIEM Formats →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40316 RCE OWASP BLT versions prior to 2.1.1
CVE-2026-40316 RCE .github/workflows/regenerate-migrations.yml workflow
CVE-2026-40316 RCE Execution of attacker-controlled website/models.py via python manage.py makemigrations

Related Posts

Critical WordPress Plugin Flaw Grants Admin Privileges

CVE-2026-4880 — The Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) plugin for WordPress is vulnerable to privilege escalation...

vulnerabilityCVEcriticalhigh-severityprivilege-escalationcwe-269
/CRITICAL /⚑ 4 IOCs

Free5GC UDR Service Leaks 5G Subscriber Identifiers

CVE-2026-40245 — Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions 4.2.1 and below contain an information disclosure vulnerability...

vulnerabilityCVEhigh-severityinformation-disclosurecwe-200cwe-202cwe-209
/HIGH /⚑ 3 IOCs

Maddy Mail Server Hit by Critical LDAP Injection Flaw

CVE-2026-40193 — maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain an LDAP injection vulnerability in the auth.ldap module where user-supplied usernames...

vulnerabilityCVEhigh-severitycwe-90
/HIGH /⚑ 5 IOCs