Home

Description

Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permissions. The vulnerable workflow uses pull_request_target trigger combined with checkout of untrusted PR code. An attacker can exploit this to steal credentials, post comments, push code, or create releases.

PUBLISHED Reserved 2026-01-12 | Published 2026-01-13 | Updated 2026-01-14 | Assigner GitHub_M




HIGH: 8.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5
affected

References

github.com/...eigent/security/advisories/GHSA-gvh4-93cq-5xxp

github.com/eigent-ai/eigent/pull/836

github.com/eigent-ai/eigent/pull/837

github.com/...ommit/bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5

cve.org (CVE-2026-22869)

nvd.nist.gov (CVE-2026-22869)

Download JSON