Remote Code Execution Vulnerability in QGIS by QGIS Development Team
CVE-2026-24480

8.7HIGH

Key Information:

Vendor

Qgis

Status
Vendor
CVE Published:
27 January 2026

What is CVE-2026-24480?

QGIS, an open-source geographical information system, was prone to a remote code execution vulnerability due to an insecure workflow in its GitHub Actions. The 'pre-commit checks' workflow utilized the 'pull_request_target' trigger, allowing untrusted code from external pull requests to be executed with elevated privileges, compromising the repository. This code could interact with the base repository's secrets and credentials, exposing users to significant security risks. The issue was addressed in commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, which removed the vulnerable workflow, enhancing overall system security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

QGIS < 76a693cd91650f9b4e83edac525e5e4f90d954e9

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.