Search criteria

2 vulnerabilities by qgis

CVE-2026-24480 (GCVE-0-2026-24480)

Vulnerability from cvelistv5 – Published: 2026-01-27 00:32 – Updated: 2026-01-27 00:32
VLAI?
Title
QGIS had validated RCE and Repository Takeover via GitHub Actions
Summary
QGIS is a free, open source, cross platform geographical information system (GIS) The repository contains a GitHub Actions workflow called "pre-commit checks" that, before commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, was vulnerable to remote code execution and repository compromise because it used the `pull_request_target` trigger and then checked out and executed untrusted pull request code in a privileged context. Workflows triggered by `pull_request_target` ran with the base repository's credentials and access to secrets. If these workflows then checked out and executed code from the head of an external pull request (which could have been attacker controlled), the attacker could have executed arbitrary commands with elevated privileges. This insecure pattern has been documented as a security risk by GitHub and security researchers. Commit 76a693cd91650f9b4e83edac525e5e4f90d954e9 removed the vulnerable code.
CWE
  • CWE-863 - Incorrect Authorization
Assigner
Impacted products
Vendor Product Version
qgis QGIS Affected: < 76a693cd91650f9b4e83edac525e5e4f90d954e9
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "QGIS",
          "vendor": "qgis",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 76a693cd91650f9b4e83edac525e5e4f90d954e9"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "QGIS is a free, open source, cross platform geographical information system (GIS) The repository contains a GitHub Actions workflow called \"pre-commit checks\" that, before commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, was vulnerable to remote code execution and repository compromise because it used the `pull_request_target` trigger and then checked out and executed untrusted pull request code in a privileged context. Workflows triggered by `pull_request_target` ran with the base repository\u0027s credentials and access to secrets. If these workflows then checked out and executed code from the head of an external pull request (which could have been attacker controlled), the attacker could have executed arbitrary commands with elevated privileges. This insecure pattern has been documented as a security risk by GitHub and security researchers. Commit 76a693cd91650f9b4e83edac525e5e4f90d954e9 removed the vulnerable code."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "CWE-863: Incorrect Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-27T00:32:04.725Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/qgis/QGIS/security/advisories/GHSA-7h99-4f97-h6rw",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/qgis/QGIS/security/advisories/GHSA-7h99-4f97-h6rw"
        },
        {
          "name": "https://github.com/qgis/QGIS/commit/76a693cd91650f9b4e83edac525e5e4f90d954e9",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/qgis/QGIS/commit/76a693cd91650f9b4e83edac525e5e4f90d954e9"
        }
      ],
      "source": {
        "advisory": "GHSA-7h99-4f97-h6rw",
        "discovery": "UNKNOWN"
      },
      "title": "QGIS had validated RCE and Repository Takeover via GitHub Actions"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-24480",
    "datePublished": "2026-01-27T00:32:04.725Z",
    "dateReserved": "2026-01-23T00:38:20.548Z",
    "dateUpdated": "2026-01-27T00:32:04.725Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-11183 (GCVE-0-2025-11183)

Vulnerability from cvelistv5 – Published: 2025-10-13 09:17 – Updated: 2025-10-14 15:04
VLAI?
Title
Cross-Site Scripting Vulnerability in QWC2
Summary
Cross-Site Scripting vulnerability in attribute table in QGIS QWC2 <2025.08.14 allows an authorized attacker to plant arbitrary JavaScript code in the page
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
https://hub.ntc.swiss/ntcf-2025-4286 technical-description
Impacted products
Vendor Product Version
QGIS QWC2 Affected: 0 , < 2025.08.14 (date)
Unaffected: 2025.08.14 (date)
Create a notification for this product.
Credits
Swiss National Test Institute for Cybersecurity NTC Swiss National Cybersecurity Centre Sandro Mani
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-11183",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-14T15:04:38.704123Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-14T15:04:46.230Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://github.com",
          "defaultStatus": "unaffected",
          "packageName": "qgis/qwc2",
          "product": "QWC2",
          "repo": "https://github.com/qgis/qwc2",
          "vendor": "QGIS",
          "versions": [
            {
              "lessThan": "2025.08.14",
              "status": "affected",
              "version": "0",
              "versionType": "date"
            },
            {
              "status": "unaffected",
              "version": "2025.08.14",
              "versionType": "date"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Swiss National Test Institute for Cybersecurity NTC"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "Swiss National Cybersecurity Centre"
        },
        {
          "lang": "en",
          "type": "remediation developer",
          "value": "Sandro Mani"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-Site Scripting vulnerability in attribute table in QGIS QWC2 \u0026lt;2025.08.14\nallows an authorized attacker to plant arbitrary JavaScript code in the page"
            }
          ],
          "value": "Cross-Site Scripting vulnerability in attribute table in QGIS QWC2 \u003c2025.08.14\nallows an authorized attacker to plant arbitrary JavaScript code in the page"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NO",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/RE:L",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "LOW"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-13T09:17:52.854Z",
        "orgId": "455daabc-a392-441d-aa46-37d35189897c",
        "shortName": "NCSC.ch"
      },
      "references": [
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://hub.ntc.swiss/ntcf-2025-4286"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Cross-Site Scripting Vulnerability in QWC2",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "455daabc-a392-441d-aa46-37d35189897c",
    "assignerShortName": "NCSC.ch",
    "cveId": "CVE-2025-11183",
    "datePublished": "2025-10-13T09:17:52.854Z",
    "dateReserved": "2025-09-30T06:08:21.427Z",
    "dateUpdated": "2025-10-14T15:04:46.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}