Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31900: CWE-20: Improper Input Validation in psf black

0
High
VulnerabilityCVE-2026-31900cvecve-2026-31900cwe-20
Published: Wed Mar 11 2026 (03/11/2026, 19:15:20 UTC)
Source: CVE Database V5
Vendor/Project: psf
Product: black

Description

Black is the uncompromising Python code formatter. Black provides a GitHub action for formatting code. This action supports an option, use_pyproject: true, for reading the version of Black to use from the repository pyproject.toml. A malicious pull request could edit pyproject.toml to use a direct URL reference to a malicious repository. This could lead to arbitrary code execution in the context of the GitHub Action. Attackers could then gain access to secrets or permissions available in the context of the action. Version 26.3.0 fixes this vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:14:36 UTC

Technical Analysis

CVE-2026-31900 is a vulnerability identified in the Python code formatter Black, maintained by the Python Software Foundation (psf). Black offers a GitHub Action for automated code formatting, which supports an option 'use_pyproject: true' to determine the Black version from the repository's pyproject.toml configuration file. The vulnerability stems from improper input validation (CWE-20) allowing a malicious actor to craft a pull request that modifies pyproject.toml to reference a malicious repository URL. When the GitHub Action runs, it fetches and executes code from this untrusted source, leading to arbitrary code execution within the GitHub Actions environment. This environment often has elevated permissions and access to repository secrets, enabling attackers to exfiltrate sensitive information or perform unauthorized operations. The vulnerability affects all Black versions prior to 26.3.0, which includes many active development environments relying on automated formatting workflows. The CVSS 4.0 base score is 8.7 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and high impacts on confidentiality, integrity, and availability. The vulnerability was published on March 11, 2026, and no known exploits have been reported in the wild yet. The fix involves validating and restricting the source of the Black version to trusted repositories and disallowing arbitrary URL references in pyproject.toml when used in GitHub Actions.

Potential Impact

This vulnerability poses a significant risk to organizations using Black in their continuous integration and deployment pipelines, especially those leveraging GitHub Actions with the 'use_pyproject: true' option enabled. Exploitation can lead to arbitrary code execution within the CI environment, potentially compromising the build process and allowing attackers to access repository secrets such as API keys, tokens, and credentials. This can result in unauthorized access to source code, deployment environments, and other integrated systems. The integrity of the software development lifecycle is at risk, as attackers could inject malicious code or disrupt automated workflows. The availability of CI/CD pipelines may also be affected if malicious code causes failures or resource exhaustion. Given the widespread use of Black in Python projects and GitHub Actions in modern development workflows, the scope of affected systems is broad, impacting software development teams globally. Organizations that do not promptly update to version 26.3.0 or implement mitigations remain vulnerable to potential attacks that could lead to data breaches, intellectual property theft, and operational disruptions.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Black to version 26.3.0 or later in all environments where it is used, particularly in GitHub Actions workflows. Review and restrict the use of the 'use_pyproject: true' option to trusted repositories only, or disable it if not essential. Implement strict branch protection rules and pull request review policies to prevent untrusted contributors from modifying pyproject.toml files. Use GitHub Actions secrets and environment protection rules to limit the scope of accessible credentials during workflows. Employ dependency scanning and code analysis tools to detect unauthorized changes to configuration files. Additionally, consider isolating CI environments and limiting permissions granted to GitHub Actions to the minimum necessary. Monitor CI/CD logs for unusual activity and audit repository changes regularly. Educate development teams about the risks of supply chain attacks and the importance of validating third-party code sources.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T21:59:02.689Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1c6312f860ef9436c35dc

Added to database: 3/11/2026, 7:44:49 PM

Last enriched: 3/19/2026, 2:14:36 AM

Last updated: 4/28/2026, 7:21:15 AM

Views: 234

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses