PT-2026-35057 · Skim · Skim
Published
2026-04-24
·
Updated
2026-04-25
·
CVE-2026-41414
CVSS v3.1
7.4
High
| AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N |
Name of the Vulnerable Software and Affected Versions
Skim (affected versions not specified)
Description
The generate-files job in the '.github/workflows/pr.yml' file checks out code from an attacker-controlled fork and executes it via the
cargo run command. This process allows access to the SKIM RS BOT PRIVATE KEY and GITHUB TOKEN (contents:write) variables. Any GitHub user can trigger this action by opening a pull request from a fork, as there are no gates to prevent exploitation.Recommendations
Apply the fix provided in commit bf63404ad51985b00ed304690ba9d477860a5a75.
Fix
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Skim