Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27701: CWE-94: Improper Control of Generation of Code ('Code Injection') in live-codes livecodes

0
High
VulnerabilityCVE-2026-27701cvecve-2026-27701cwe-94
Published: Wed Feb 25 2026 (02/25/2026, 15:06:17 UTC)
Source: CVE Database V5
Vendor/Project: live-codes
Product: livecodes

Description

CVE-2026-27701 is a high-severity code injection vulnerability in the LiveCode open-source client-side code playground. The flaw exists in the `i18n-update-pull` GitHub Actions workflow prior to a specific commit, where the title of a pull request is unsafely interpolated into a JavaScript block. This allows an attacker who submits a maliciously crafted PR title to execute arbitrary JavaScript with the privileges of the CI bot token. Exploitation can lead to exfiltration of repository secrets and unauthorized GitHub API operations. The vulnerability requires user interaction (opening a PR) and has a high attack complexity. A fix was introduced in commit e151c64c2bd80d2d53ac1333f1df9429fe6a1a11. No known exploits are reported in the wild yet. Organizations using affected versions of LiveCode and relying on this GitHub Actions workflow are at risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 15:55:50 UTC

Technical Analysis

CVE-2026-27701 is a critical code injection vulnerability classified under CWE-94 affecting LiveCode, an open-source client-side code playground. The vulnerability resides in the `i18n-update-pull` GitHub Actions workflow, specifically in how it handles the title of pull requests. Before the fix, the PR title was directly interpolated into a JavaScript block executed by the `actions/github-script` action without proper sanitization or validation. This unsafe interpolation allows an attacker who creates a pull request with a specially crafted title to inject arbitrary JavaScript code. The injected code runs with the privileges of the CI bot token, which includes `CI_APP_ID` and `CI_APP_PRIVATE_KEY`. These credentials provide elevated access to the repository, enabling the attacker to exfiltrate sensitive repository secrets and perform unauthorized operations via the GitHub API. The vulnerability requires an attacker to open a pull request, thus involving user interaction, and has a high attack complexity due to the need to craft a valid PR title that triggers the injection. The issue was resolved in commit e151c64c2bd80d2d53ac1333f1df9429fe6a1a11 by sanitizing the input or changing how the PR title is handled in the workflow. No public exploits have been reported so far, but the potential impact is significant given the access level of the CI token. This vulnerability highlights the risks of improper input handling in CI/CD workflows and the importance of securing automation scripts that interact with external inputs.

Potential Impact

The impact of CVE-2026-27701 is substantial for organizations using LiveCode with the vulnerable GitHub Actions workflow. Successful exploitation allows attackers to execute arbitrary JavaScript code with the privileges of the CI bot token, which can lead to the theft of repository secrets such as API keys, credentials, and other sensitive data stored in GitHub secrets. Unauthorized GitHub API operations could include modifying repository contents, creating or merging pull requests, or disrupting CI/CD pipelines. This can compromise the integrity and confidentiality of the software development lifecycle, potentially leading to supply chain attacks or unauthorized code changes. The vulnerability could also damage organizational reputation and trust if source code or secrets are leaked. Since the attack requires opening a pull request, organizations with open or public repositories accepting external contributions are at higher risk. The high CVSS score of 8.8 reflects the critical nature of the vulnerability, combining high impact with moderate attack complexity.

Mitigation Recommendations

To mitigate CVE-2026-27701, organizations should immediately update LiveCode to include the fix introduced in commit e151c64c2bd80d2d53ac1333f1df9429fe6a1a11 or later. Review and sanitize all inputs used in GitHub Actions workflows, especially those interpolated into scripts or commands, to prevent code injection. Implement strict validation and escaping of pull request titles or any user-generated content before usage in automation scripts. Limit the scope and permissions of CI bot tokens to the minimum necessary, employing the principle of least privilege to reduce potential damage from token compromise. Monitor repository activity for unusual pull requests or workflow executions, and audit GitHub secrets usage and access logs for anomalies. Consider using GitHub’s security features such as branch protection rules and required reviews to control pull request merges. Finally, educate development teams about the risks of injecting untrusted input into CI/CD pipelines and encourage secure coding practices in automation workflows.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T17:56:51.202Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f183fb7ef31ef0b2eb1c9

Added to database: 2/25/2026, 3:41:51 PM

Last enriched: 2/25/2026, 3:55:50 PM

Last updated: 2/25/2026, 7:38:34 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats