Description

WPGraphQL provides a GraphQL API for WordPress sites. Prior to version 2.9.1, the `wp-graphql/wp-graphql` repository contains a GitHub Actions workflow (`release.yml`) vulnerable to OS command injection through direct use of `${{ github.event.pull_request.body }}` inside a `run:` shell block. When a pull request from `develop` to `master` is merged, the PR body is injected verbatim into a shell command, allowing arbitrary command execution on the Actions runner. Version 2.9.1 contains a fix for the vulnerability.

INFO

Published Date :

2026-02-26T01:10:26.985Z

Last Modified :

2026-02-26T19:22:46.590Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-27938 vulnerability.

Vendors Products
Wordpress
  • Wordpress
Wpgraphql
  • Wpgraphql
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-27938.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact