Skim is a fuzzy finder designed to through files, lines, and commands. The generate-files job in .github/workflows/pr.yml checks out attacker-controlled fork code and executes it via cargo run, with access to SKIM_RS_BOT_PRIVATE_KEY and GITHUB_TOKEN (contents:write). No gates prevent exploitation - any GitHub user can trigger this by opening a pull request from a fork. This vulnerability is fixed with commit bf63404ad51985b00ed304690ba9d477860a5a75.
History

Fri, 24 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Skim is a fuzzy finder designed to through files, lines, and commands. The generate-files job in .github/workflows/pr.yml checks out attacker-controlled fork code and executes it via cargo run, with access to SKIM_RS_BOT_PRIVATE_KEY and GITHUB_TOKEN (contents:write). No gates prevent exploitation - any GitHub user can trigger this by opening a pull request from a fork. This vulnerability is fixed with commit bf63404ad51985b00ed304690ba9d477860a5a75.
Title Skim: Arbitrary code execution via pull_request_target fork checkout in pr.yml
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-04-24T18:32:36.283Z

Updated: 2026-04-24T18:32:36.283Z

Reserved: 2026-04-20T15:32:33.812Z

Link: CVE-2026-41414

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-24T19:17:13.020

Modified: 2026-04-24T19:17:13.020

Link: CVE-2026-41414

cve-icon Redhat

No data.