CVE-2026-41414: Skim Fuzzy Finder Vulnerability Exposes GitHub Tokens
The National Vulnerability Database has disclosed CVE-2026-41414, a high-severity vulnerability affecting Skim, a fuzzy finder utility. This flaw, rated 7.4 CVSS, stems from an insecure GitHub Actions workflow (.github/workflows/pr.yml) where the generate-files job executes attacker-controlled code from a pull request with elevated permissions. Specifically, it grants access to SKIM_RS_BOT_PRIVATE_KEY and GITHUB_TOKEN (with contents:write scope).
Crucially, there are no gates preventing exploitation. Any GitHub user can trigger this by simply opening a pull request from a fork. This means a malicious actor could leverage a crafted pull request to gain unauthorized access to sensitive repository secrets, potentially leading to repository compromise or further lateral movement within GitHub’s ecosystem. The vulnerability is addressed in commit bf63404ad51985b00ed304690ba9d477860a5a75.
This incident is a stark reminder of the inherent risks in overly permissive CI/CD pipelines, especially those executing untrusted code with elevated privileges. The attacker’s calculus here is low effort, high reward: a simple pull request can unlock critical secrets. Defenders need to scrutinize their GitHub Actions workflows, particularly those triggered by external contributions, to ensure least privilege and robust input validation.
What This Means For You
- If your organization uses Skim, ensure you've updated to the patched version. More broadly, audit your GitHub Actions workflows for similar patterns: any workflow that checks out and executes code from untrusted forks with access to repository secrets like `GITHUB_TOKEN` or other private keys is a critical attack surface. Revoke any potentially compromised tokens immediately.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41414: Skim Fuzzy Finder PR from Fork Triggering Cargo Run
title: CVE-2026-41414: Skim Fuzzy Finder PR from Fork Triggering Cargo Run
id: scw-2026-04-24-ai-1
status: experimental
level: critical
description: |
Detects the execution of 'cargo run' specifically within the context of the '.github/workflows/pr.yml' file, which is the vulnerable job in Skim Fuzzy Finder. This indicates an attempt to exploit CVE-2026-41414 by triggering code execution from an attacker-controlled fork via a pull request.
author: SCW Feed Engine (AI-generated)
date: 2026-04-24
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41414/
tags:
- attack.execution
- attack.t1059.003
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'cargo.exe'
CommandLine|contains:
- 'run'
CommandLine|contains:
- '--manifest-path'
CommandLine|contains:
- '.github/workflows/pr.yml'
CommandLine|contains:
- 'skim'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41414 | RCE | Skim fuzzy finder |
| CVE-2026-41414 | RCE | .github/workflows/pr.yml generate-files job |
| CVE-2026-41414 | Information Disclosure | Access to SKIM_RS_BOT_PRIVATE_KEY and GITHUB_TOKEN |
| CVE-2026-41414 | RCE | Exploitable via pull request from a fork |
| CVE-2026-41414 | Patch | Commit bf63404ad51985b00ed304690ba9d477860a5a75 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 24, 2026 at 22:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.