Description

In the Eclipse Theia Website repository, the GitHub Actions workflow .github/workflows/preview.yml used pull_request_target trigger while checking out and executing untrusted pull request code. This allowed any GitHub user to execute arbitrary code in the repository's CI environment with access to repository secrets and a GITHUB_TOKEN with extensive write permissions (contents:write, packages:write, pages:write, actions:write). An attacker could exfiltrate secrets, publish malicious packages to the eclipse-theia organization, modify the official Theia website, and push malicious code to the repository.

INFO

Published Date :

2026-01-30T09:57:14.877Z

Last Modified :

2026-02-02T19:26:31.652Z

Source :

eclipse
AFFECTED PRODUCTS

The following products are affected by CVE-2026-1699 vulnerability.

Vendors Products
Eclipse
  • Theia
  • Theia Website
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1699.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact