Remote Code Execution Vulnerability in QGIS by QGIS Development Team
CVE-2026-24480
What is CVE-2026-24480?
QGIS, an open-source geographical information system, was prone to a remote code execution vulnerability due to an insecure workflow in its GitHub Actions. The 'pre-commit checks' workflow utilized the 'pull_request_target' trigger, allowing untrusted code from external pull requests to be executed with elevated privileges, compromising the repository. This code could interact with the base repository's secrets and credentials, exposing users to significant security risks. The issue was addressed in commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, which removed the vulnerable workflow, enhancing overall system security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
QGIS < 76a693cd91650f9b4e83edac525e5e4f90d954e9
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
