Github

57 CVEs product

Monthly

CVE-2026-31976 Monitor

xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into action.yml. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable v5 tag to point at the malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) from one of the un...

Github
NVD GitHub VulDB
EPSS
0.1%
CVE-2026-31900 Monitor

Black is the uncompromising Python code formatter. Black provides a GitHub action for formatting code.

Python Github
NVD GitHub VulDB
EPSS
0.1%
CVE-2026-3582 MEDIUM This Month

GitHub Enterprise Server allows authenticated users with limited personal access tokens to access private and internal repository data through the search API if they already have some level of access to those repositories via organization membership or collaborator status. This authorization bypass affects versions prior to 3.20 and enables information disclosure despite the tokens lacking the necessary repository scope permissions. No patch is currently available for this MEDIUM severity vulnerability.

Github Enterprise Server
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-2266 MEDIUM This Month

DOM-based XSS in GitHub Enterprise Server prior to version 3.20 allows authenticated attackers to execute arbitrary JavaScript in other users' browsers by injecting malicious HTML through task list content in issues and pull requests. The vulnerability stems from improper input neutralization in the task list rendering logic, which fails to re-encode user-supplied content before display. An attacker with repository access could exploit this to steal session tokens or perform actions on behalf of other users.

Github XSS Enterprise Server
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.1%
CVE-2026-3854 HIGH This Week

Remote code execution in GitHub Enterprise Server allows authenticated users with repository push access to execute arbitrary code via unsanitized push option values that bypass internal header validation. An attacker can inject malicious metadata fields by exploiting insufficient input sanitization in the git push operation handler. This high-severity vulnerability affects GitHub Enterprise Server versions prior to 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6, and 3.19.3, with no patch currently available for all affected installations.

Github RCE Enterprise Server
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.5%
CVE-2026-3306 MEDIUM This Month

GitHub Enterprise Server allows users with read-only repository access and project write permissions to modify issue and pull request metadata by exploiting insufficient authorization checks when updating project items. An attacker with these limited permissions can alter sensitive metadata without the required repository write access, potentially disrupting workflow management and data integrity. This vulnerability affects multiple versions and currently has no publicly available patch.

Github Enterprise Server
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-30920 HIGH POC PATCH This Week

OneUptime versions prior to 10.0.19 allow unauthenticated attackers to hijack GitHub App integrations across projects by exploiting insufficient validation in the OAuth callback handler, enabling them to redirect repository access and create code records in arbitrary projects. Public exploit code exists for this vulnerability, and GitHub and OneUptime users remain at risk until patches are applied, as no fixes are currently available for the affected GitHub integration.

Github Oneuptime
NVD GitHub
CVSS 3.1
8.6
EPSS
0.0%
CVE-2026-29783 PATCH This Week

The shell tool within GitHub Copilot CLI versions prior to and including 0.0.422 can allow arbitrary code execution through crafted bash parameter expansion patterns.

Github
NVD GitHub
EPSS
0.1%
CVE-2025-15558 HIGH PATCH GHSA This Week

Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. [CVSS 8.0 HIGH]

Windows Docker Github Command Line Interface Redhat +1
NVD GitHub
CVSS 3.1
8.0
EPSS
0.0%
CVE-2026-3136 CRITICAL Act Now

Improper authorization in Google Cloud Build GitHub Trigger allowing unauthenticated build execution. EPSS 0.19%.

Google Github Cloud Build
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2026-3286 MEDIUM POC This Month

Server-side request forgery in Paicoding 1.0.0-1.0.3 allows authenticated attackers to manipulate the image upload parameter and trigger arbitrary outbound requests from the affected server. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification. The attack requires valid credentials but poses risks to internal network reconnaissance and data exfiltration.

Java Github SSRF Paicoding
NVD VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-28215 CRITICAL POC Act Now

Unauthenticated infrastructure overwrite in Hoppscotch API development ecosystem before 2026.2.0. Attackers can overwrite the entire infrastructure configuration. PoC available.

Github Hoppscotch
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-27943 MEDIUM POC PATCH This Month

Authenticated users in OpenEMR through version 8.0.0 can access and modify eye exam records belonging to other patients by manipulating form IDs, bypassing patient context validation. This allows disclosure or alteration of sensitive medical data across the patient database, and public exploit code exists for this vulnerability. A patch is available on the main branch of the OpenEMR repository.

Github Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-27941 CRITICAL POC PATCH Act Now

Supply chain attack vector in OpenLIT GitHub Actions workflows. The pull_request_target trigger with checkout enables malicious PRs to execute code in the context of the base repository. PoC and patch available.

Github AI / ML Openlit Software Development Kit
NVD GitHub
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-27938 HIGH This Week

Arbitrary command execution in WPGraphQL's GitHub Actions workflow allows attackers with pull request creation privileges to inject shell commands through unvalidated pull request body content, potentially compromising the build environment and repository integrity. The vulnerability affects WPGraphQL versions prior to 2.9.1 and requires low privileges and user interaction to exploit. No patch is currently available for affected deployments.

WordPress Github Command Injection
NVD GitHub
CVSS 3.1
7.7
EPSS
0.1%
CVE-2026-27701 This Week

LiveCode is an open-source, client-side code playground. Prior to commit e151c64c2bd80d2d53ac1333f1df9429fe6a1a11, LiveCode's `i18n-update-pull` GitHub Actions workflow is vulnerable to JavaScript injection.

Github
NVD GitHub
EPSS
0.1%
CVE-2026-27612 MEDIUM POC PATCH This Month

Reflected XSS in Repostat's RepoCard React component prior to version 1.0.1 allows attackers to execute arbitrary JavaScript in users' browsers when developers pass unsanitized input from URL parameters or other sources to the repo prop. The vulnerability stems from unsafe use of dangerouslySetInnerHTML without input validation, and public exploit code exists. Upgrading to version 1.0.1 or later eliminates the risk by removing dangerouslySetInnerHTML in favor of safe JSX data binding.

Github React XSS Repostat
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-1229 CRITICAL PATCH Act Now

Incorrect computation in CIRCL cryptographic library's CombinedMult function for secp384r1 (P-384) curve. Produces wrong elliptic curve multiplication results for specific inputs, potentially breaking ECDSA signature verification.

Github Circl Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-26967 MEDIUM PATCH This Month

PJSIP versions 2.16 and below contain a heap buffer overflow in the H.264 video unpacketizer that fails to properly validate NAL unit size fields in malformed SRTP packets, allowing remote attackers to trigger memory corruption on systems receiving H.264 video streams. The vulnerability has a CVSS score of 5.3 and enables information disclosure through heap memory access. A patch is available for affected deployments.

Github Buffer Overflow Heap Overflow Pjsip Redhat
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-26958 PATCH Monitor

filippo.io/edwards25519 is a Go library implementing the edwards25519 elliptic curve with APIs for building cryptographic primitives. In versions 1.1.0 and earlier, MultiScalarMult produces invalid results or undefined behavior if the receiver is not the identity point.

Golang MySQL Github
NVD GitHub
EPSS
0.1%
CVE-2026-26323 HIGH PATCH This Week

Arbitrary command execution in OpenClaw versions 2026.1.8 through 2026.2.13 allows attackers to execute shell commands when developers or CI systems run the update-clawtributors.ts maintenance script on repositories containing malicious commit metadata. The vulnerability stems from unsanitized interpolation of git author emails into shell commands via execSync, exploitable only by those with access to the development environment or source repository. Version 2026.2.14 patches the issue.

Node.js Github Command Injection AI / ML Openclaw
NVD GitHub
CVSS 3.1
8.8
EPSS
0.2%
CVE-2026-26189 MEDIUM PATCH This Month

Trivy Action versions 0.31.0 through 0.33.1 allow remote code execution on GitHub Actions runners due to insufficient input sanitization when constructing shell environment variable exports. An attacker with repository access can inject shell metacharacters through action inputs to achieve arbitrary command execution in the runner context. The vulnerability requires high privileges to exploit and is addressed in version 0.34.0.

Docker Github Command Injection Trivy Action
NVD GitHub
CVSS 3.1
5.9
EPSS
0.1%
CVE-2026-25739 MEDIUM PATCH This Month

Cross-site scripting in Indico prior to version 3.3.10 allows authenticated users to inject malicious scripts through material file uploads, potentially compromising other users' sessions or stealing sensitive data. The vulnerability affects Indico deployments using Flask-Multipass authentication and requires both user interaction and authenticated access to exploit. A patch is available, and administrators should upgrade to version 3.3.10 and update webserver configurations to enforce strict Content Security Policy for file downloads.

Nginx Github Flask XSS Indico
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-1355 MEDIUM This Month

GitHub Enterprise Server versions before 3.20 contain an authorization bypass in the repository migration upload endpoint that permits authenticated attackers to inject malicious content into other users' migration exports. An attacker can overwrite a victim's migration archive and cause them to download compromised repository data during restoration or automated imports. No patch is currently available, affecting all versions prior to 3.20.

Github Enterprise Server
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-0573 CRITICAL Act Now

URL redirection vulnerability in GitHub Enterprise Server allows attacker-controlled redirects through crafted URLs, potentially enabling credential theft via phishing.

Github RCE Enterprise Server
NVD GitHub
CVSS 3.1
9.0
EPSS
0.1%
CVE-2026-1721 PATCH This Week

Summary A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the AI Playground's OAuth callback handler.

Github XSS
NVD GitHub
EPSS
0.0%
CVE-2026-21523 HIGH This Week

Authenticated users can exploit a race condition in GitHub Copilot and Visual Studio Code to execute arbitrary code remotely by manipulating file state between verification and use. This vulnerability affects users with network access to these development tools and requires user interaction to trigger. No patch is currently available to address this high-severity flaw.

Github Race Condition AI / ML Visual Studio Code
NVD
CVSS 3.1
8.0
EPSS
0.0%
CVE-2026-21518 HIGH This Week

GitHub Copilot and Visual Studio Code are vulnerable to command injection attacks that allow unauthenticated attackers to bypass security features over the network through improper neutralization of special command elements. The vulnerability requires user interaction to exploit and could enable attackers to execute arbitrary commands with high impact on confidentiality, integrity, and availability. No patch is currently available for this issue.

Github Command Injection AI / ML Visual Studio Code
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-21516 HIGH This Week

GitHub Copilot is vulnerable to command injection attacks that enable remote code execution without requiring authentication or user interaction beyond a click. An attacker can exploit this network-accessible vulnerability to execute arbitrary commands on affected systems. No patch is currently available for this high-severity vulnerability.

Github Command Injection AI / ML Github Copilot
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-21257 HIGH This Week

GitHub Copilot and Visual Studio 2022 contain a command injection vulnerability that allows authenticated users to execute arbitrary commands through improper sanitization of special elements. An attacker with valid credentials can leverage user interaction to escalate privileges and gain elevated access across the network. No patch is currently available for this vulnerability.

Github Command Injection AI / ML Visual Studio 2022
NVD
CVSS 3.1
8.0
EPSS
0.0%
CVE-2026-21256 HIGH This Week

Remote code execution in GitHub Copilot and Visual Studio 2022 via command injection allows unauthenticated attackers to execute arbitrary code over the network with user interaction. The vulnerability stems from improper sanitization of special elements in commands, enabling attackers to break out of intended command contexts and inject malicious payloads. No patch is currently available for this high-severity issue affecting both development environments.

Github Command Injection AI / ML Visual Studio 2022
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25761 HIGH This Week

Command injection in GitHub Super-linter versions 6.0.0 through 8.3.0 allows attackers to execute arbitrary commands in workflow runner contexts by submitting pull requests with maliciously crafted filenames containing shell command substitution syntax. An attacker exploiting this vulnerability can access sensitive workflow credentials, including GITHUB_TOKEN, depending on permission configurations. The vulnerability affects Super-linter when used as a GitHub Action and has no available patch at this time.

Github Command Injection Super Linter
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25598 MEDIUM This Month

Harden-Runner versions prior to 2.14.2 fail to log outbound network connections made through sendto, sendmsg, and sendmmsg socket calls when audit mode is enabled, allowing attackers to exfiltrate data from GitHub Actions runners without detection. This integrity bypass affects users relying on Harden-Runner's egress policy auditing for security monitoring. A patch is available in version 2.14.2 and later.

Github Harden Runner Redhat
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-1337 MEDIUM POC PATCH This Month

Neo4J versions up to 2026.01 contains a vulnerability that allows attackers to XSS if the user opens the logs in a tool that treats them as HTML (CVSS 5.4).

Github XSS Neo4j
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-1664 PATCH Monitor

Summary An Insecure Direct Object Reference has been found to exist in `createHeaderBasedEmailResolver()` function within the Cloudflare Agents SDK.

Github
NVD GitHub
EPSS
0.0%
CVE-2026-25221 HIGH POC PATCH This Week

PolarLearn versions 0-PRERELEASE-15 and earlier lack proper state parameter validation in OAuth 2.0 authentication, enabling attackers to conduct login CSRF attacks against GitHub and Google login flows. An attacker can pre-authenticate a victim's session and trick them into logging into the attacker's account, causing the victim's data and academic progress to be stored on the attacker's account instead. Public exploit code exists for this vulnerability, and a patch is available.

Github CSRF Information Disclosure Polarlearn
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-1699 CRITICAL POC Act Now

Supply chain vulnerability in Eclipse Theia GitHub Actions workflow. The preview.yml workflow uses pull_request_target with checkout, enabling malicious PRs to steal secrets. CVSS 10.0, PoC available.

Github Theia Website
NVD
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-24889 MEDIUM PATCH This Month

Arithmetic overflow in Soroban SDK versions up to 25.0.2 allows contracts using user-controlled range bounds in Bytes::slice, Vec::slice, or Prng::gen_range methods to operate on incorrect data ranges or generate unintended random numbers, potentially corrupting contract state. Developers who do not enable overflow-checks in their Rust configuration are vulnerable to this silent data corruption. A patch is available and should be applied immediately to affected Soroban contracts.

Github Rs Soroban Sdk
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-24910 MEDIUM This Month

Bun versions prior to 1.3.5 allow attackers to bypass the trusted dependencies allowlist by creating non-npm packages with names matching legitimate packages, enabling potential code execution through dependency confusion attacks. This local vulnerability affects systems using Bun's package management where an attacker can craft malicious packages with identical names to trusted dependencies. No patch is currently available for affected Node.js and GitHub integrations.

Node.js Github
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-24480 This Week

QGIS is a free, open source, cross platform geographical information system (GIS) The repository contains a GitHub Actions workflow called "pre-commit checks" that, before commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, was vulnerable to remote code execution and repository compromise because it used the `pull_request_target` trigger and then checked out and executed untrusted pull request code in a privileged context.

Github RCE
NVD GitHub
EPSS
0.4%
CVE-2026-23889 MEDIUM POC PATCH This Month

Path traversal in pnpm's tarball extraction on Windows allows attackers to write files outside the intended package directory by exploiting incomplete path normalization that fails to block backslash-based traversal sequences. Public exploit code exists for this vulnerability, which affects Windows developers and CI/CD pipelines (GitHub Actions, Azure DevOps) and could result in overwriting sensitive configuration files like .npmrc or build configurations. A patch is available in pnpm version 10.28.1 and later.

Windows Node.js Azure Github Path Traversal +2
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-11065 MEDIUM PATCH This Month

A flaw was found in github.com/go-viper/mapstructure/v2, in the field processing component using mapstructure.WeakDecode. [CVSS 5.3 MEDIUM]

Github Information Disclosure Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-0756 CRITICAL Act Now

github-kanban-mcp-server has a command injection in execAsync (EPSS 1.0%) enabling remote code execution on developer machines using the GitHub Kanban MCP integration.

Github RCE Command Injection AI / ML
NVD
CVSS 3.0
9.8
EPSS
1.0%
CVE-2026-24137 MEDIUM PATCH This Month

The Golang sigstore framework versions 1.10.3 and below fail to validate cache directory paths in the legacy TUF client, allowing a malicious TUF repository to overwrite arbitrary files on disk within the calling process's permission scope. This impacts direct users of the TUF client in sigstore/sigstore and older Cosign versions, though public Sigstore deployments are protected by metadata validation from trusted collaborators. No patch is currently available for this medium-severity path traversal vulnerability.

Golang Github Redhat Suse
NVD GitHub
CVSS 3.1
5.8
EPSS
0.0%
CVE-2025-69209 This Week

ArduinoCore-avr contains the source code and configuration files of the Arduino AVR Boards platform. A vulnerability in versions prior to 1.8.7 allows an attacker to trigger a stack-based buffer overflow when converting floating-point values to strings with high precision. By passing very large `decimalPlaces` values to the affected String constructors or concat methods, the `dtostrf` function writes beyond fixed-size stack buffers, causing memory corruption and denial of service. Under speci...

Github Buffer Overflow Stack Overflow Memory Corruption Denial Of Service +1
NVD GitHub
EPSS
0.0%
CVE-2025-56005 CRITICAL POC PATCH Act Now

PLY (Python Lex-Yacc) library 3.11 has an unsafe feature enabling remote code execution through pickle deserialization of cached parser tables, with EPSS 0.91%.

Python Github RCE Deserialization AI / ML +3
NVD GitHub
CVSS 3.1
9.8
EPSS
0.9%
CVE-2026-23644 HIGH POC PATCH This Week

Path traversal in esm.sh CDN prior to version 0.0.0-20260116051925-c62ab83c589e allows unauthenticated remote attackers to write arbitrary files to the server through malicious tar archives, bypassing incomplete path sanitization. Public exploit code exists for this vulnerability. The issue stems from improper validation of absolute paths in tar file entries, enabling potential code execution or service disruption on affected systems.

Golang Github Path Traversal Esm.Sh Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-60021 CRITICAL Act Now

Apache bRPC versions before 1.15.0 contain a remote command injection vulnerability in the heap profiler built-in service, allowing attackers to execute arbitrary OS commands.

Apache Github Command Injection Brpc
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-1002 MEDIUM POC PATCH This Month

Improper URI path normalization in Vert.x Web's static file handler allows remote attackers to manipulate the cache and deny access to static files through specially crafted request URIs containing encoded path traversal sequences. An unauthenticated attacker can exploit this vulnerability over the network with no user interaction to cause denial of service by returning HTTP 404 responses for normally accessible files. Public exploit code exists and patches are available.

Github Vert.X Web Redhat
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-22869 CRITICAL POC PATCH Act Now

Eigent multi-agent workflow CI pipeline (ci.yml) uses pull_request_target with checkout of untrusted PR code, enabling arbitrary code execution with repository write permissions from fork PRs. PoC available, patch available.

Github AI / ML Eigent
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-14147 MEDIUM This Month

The Easy GitHub Gist Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter of the gist shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. [CVSS 6.4 MEDIUM]

WordPress Github XSS PHP
NVD
CVSS 3.1
6.4
EPSS
0.0%
CVE-2025-13744 MEDIUM This Month

An Improper Neutralization of Input During Web Page Generation vulnerability was identified in GitHub Enterprise Server that allowed attacker controlled HTML to be rendered by the Filter component (search) across GitHub that could be used to exfiltrate sensitive information. [CVSS 5.4 MEDIUM]

Github Enterprise Server
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-61916 HIGH PATCH This Week

Spinnaker is an open source, multi-cloud continuous delivery platform. Versions prior to 2025.1.6, 2025.2.3, and 2025.3.0 are vulnerable to server-side request forgery. [CVSS 7.9 HIGH]

Docker Kubernetes Aws Gitlab Github +2
NVD GitHub
CVSS 3.1
7.9
EPSS
0.0%
CVE-2025-68619 HIGH POC PATCH This Week

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the appstore interface allow administrators to install npm packages through a REST API endpoint. [CVSS 7.2 HIGH]

Node.js Github Signal K Server RCE
NVD GitHub
CVSS 3.1
7.2
EPSS
0.1%
CVE-2025-52483 CRITICAL PATCH Act Now

Registrator, a GitHub app automating Julia package registration, contains critical shell injection and argument injection vulnerabilities in versions prior to 1.9.5 that can be exploited through malicious or injected clone URLs returned by GitHub. An unauthenticated remote attacker can achieve arbitrary code execution on systems running vulnerable versions with no user interaction required. No public exploits are confirmed, but the vulnerability is trivial to exploit given the direct code paths involved.

Command Injection RCE Code Injection Github Python +1
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-52467 CRITICAL Act Now

pgai, a Python library for PostgreSQL-based RAG and agentic applications, contains a secrets exfiltration vulnerability (CVE-2025-52467) that allows unauthenticated remote attackers to extract all workflow secrets, including GITHUB_TOKEN credentials with repository write permissions. This vulnerability has a CVSS score of 9.1 (Critical) and affects pgai versions prior to commit 8eb3567; a patch is available and the vulnerability is not currently listed in CISA KEV, though the high CVSS and direct credential exposure indicate substantial real-world risk if the library is deployed in CI/CD environments.

Python Information Disclosure RCE Github
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-49013 CRITICAL Act Now

A security vulnerability in WilderForge (CVSS 9.9). Critical severity with potential for significant impact on affected systems.

RCE Code Injection Github
NVD GitHub
CVSS 3.1
9.9
EPSS
0.5%
CVE-2026-31976
EPSS 0%
Monitor

xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into action.yml. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable v5 tag to point at the malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) from one of the un...

Github
NVD GitHub VulDB
CVE-2026-31900
EPSS 0%
Monitor

Black is the uncompromising Python code formatter. Black provides a GitHub action for formatting code.

Python Github
NVD GitHub VulDB
CVE-2026-3582
EPSS 0% CVSS 4.3
MEDIUM This Month

GitHub Enterprise Server allows authenticated users with limited personal access tokens to access private and internal repository data through the search API if they already have some level of access to those repositories via organization membership or collaborator status. This authorization bypass affects versions prior to 3.20 and enables information disclosure despite the tokens lacking the necessary repository scope permissions. No patch is currently available for this MEDIUM severity vulnerability.

Github Enterprise Server
NVD GitHub VulDB
CVE-2026-2266
EPSS 0% CVSS 5.4
MEDIUM This Month

DOM-based XSS in GitHub Enterprise Server prior to version 3.20 allows authenticated attackers to execute arbitrary JavaScript in other users' browsers by injecting malicious HTML through task list content in issues and pull requests. The vulnerability stems from improper input neutralization in the task list rendering logic, which fails to re-encode user-supplied content before display. An attacker with repository access could exploit this to steal session tokens or perform actions on behalf of other users.

Github XSS Enterprise Server
NVD GitHub VulDB
CVE-2026-3854
EPSS 1% CVSS 8.8
HIGH This Week

Remote code execution in GitHub Enterprise Server allows authenticated users with repository push access to execute arbitrary code via unsanitized push option values that bypass internal header validation. An attacker can inject malicious metadata fields by exploiting insufficient input sanitization in the git push operation handler. This high-severity vulnerability affects GitHub Enterprise Server versions prior to 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6, and 3.19.3, with no patch currently available for all affected installations.

Github RCE Enterprise Server
NVD GitHub VulDB
CVE-2026-3306
EPSS 0% CVSS 4.3
MEDIUM This Month

GitHub Enterprise Server allows users with read-only repository access and project write permissions to modify issue and pull request metadata by exploiting insufficient authorization checks when updating project items. An attacker with these limited permissions can alter sensitive metadata without the required repository write access, potentially disrupting workflow management and data integrity. This vulnerability affects multiple versions and currently has no publicly available patch.

Github Enterprise Server
NVD GitHub VulDB
CVE-2026-30920
EPSS 0% CVSS 8.6
HIGH POC PATCH This Week

OneUptime versions prior to 10.0.19 allow unauthenticated attackers to hijack GitHub App integrations across projects by exploiting insufficient validation in the OAuth callback handler, enabling them to redirect repository access and create code records in arbitrary projects. Public exploit code exists for this vulnerability, and GitHub and OneUptime users remain at risk until patches are applied, as no fixes are currently available for the affected GitHub integration.

Github Oneuptime
NVD GitHub
CVE-2026-29783
EPSS 0%
PATCH This Week

The shell tool within GitHub Copilot CLI versions prior to and including 0.0.422 can allow arbitrary code execution through crafted bash parameter expansion patterns.

Github
NVD GitHub
CVE-2025-15558
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. [CVSS 8.0 HIGH]

Windows Docker Github +3
NVD GitHub
CVE-2026-3136
EPSS 0% CVSS 9.8
CRITICAL Act Now

Improper authorization in Google Cloud Build GitHub Trigger allowing unauthenticated build execution. EPSS 0.19%.

Google Github Cloud Build
NVD
CVE-2026-3286
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Server-side request forgery in Paicoding 1.0.0-1.0.3 allows authenticated attackers to manipulate the image upload parameter and trigger arbitrary outbound requests from the affected server. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification. The attack requires valid credentials but poses risks to internal network reconnaissance and data exfiltration.

Java Github SSRF +1
NVD VulDB
CVE-2026-28215
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

Unauthenticated infrastructure overwrite in Hoppscotch API development ecosystem before 2026.2.0. Attackers can overwrite the entire infrastructure configuration. PoC available.

Github Hoppscotch
NVD GitHub
CVE-2026-27943
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Authenticated users in OpenEMR through version 8.0.0 can access and modify eye exam records belonging to other patients by manipulating form IDs, bypassing patient context validation. This allows disclosure or alteration of sensitive medical data across the patient database, and public exploit code exists for this vulnerability. A patch is available on the main branch of the OpenEMR repository.

Github Openemr
NVD GitHub
CVE-2026-27941
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

Supply chain attack vector in OpenLIT GitHub Actions workflows. The pull_request_target trigger with checkout enables malicious PRs to execute code in the context of the base repository. PoC and patch available.

Github AI / ML Openlit Software Development Kit
NVD GitHub
CVE-2026-27938
EPSS 0% CVSS 7.7
HIGH This Week

Arbitrary command execution in WPGraphQL's GitHub Actions workflow allows attackers with pull request creation privileges to inject shell commands through unvalidated pull request body content, potentially compromising the build environment and repository integrity. The vulnerability affects WPGraphQL versions prior to 2.9.1 and requires low privileges and user interaction to exploit. No patch is currently available for affected deployments.

WordPress Github Command Injection
NVD GitHub
CVE-2026-27701
EPSS 0%
This Week

LiveCode is an open-source, client-side code playground. Prior to commit e151c64c2bd80d2d53ac1333f1df9429fe6a1a11, LiveCode's `i18n-update-pull` GitHub Actions workflow is vulnerable to JavaScript injection.

Github
NVD GitHub
CVE-2026-27612
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

Reflected XSS in Repostat's RepoCard React component prior to version 1.0.1 allows attackers to execute arbitrary JavaScript in users' browsers when developers pass unsanitized input from URL parameters or other sources to the repo prop. The vulnerability stems from unsafe use of dangerouslySetInnerHTML without input validation, and public exploit code exists. Upgrading to version 1.0.1 or later eliminates the risk by removing dangerouslySetInnerHTML in favor of safe JSX data binding.

Github React XSS +1
NVD GitHub
CVE-2026-1229
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Incorrect computation in CIRCL cryptographic library's CombinedMult function for secp384r1 (P-384) curve. Produces wrong elliptic curve multiplication results for specific inputs, potentially breaking ECDSA signature verification.

Github Circl Suse
NVD GitHub
CVE-2026-26967
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

PJSIP versions 2.16 and below contain a heap buffer overflow in the H.264 video unpacketizer that fails to properly validate NAL unit size fields in malformed SRTP packets, allowing remote attackers to trigger memory corruption on systems receiving H.264 video streams. The vulnerability has a CVSS score of 5.3 and enables information disclosure through heap memory access. A patch is available for affected deployments.

Github Buffer Overflow Heap Overflow +2
NVD GitHub
CVE-2026-26958
EPSS 0%
PATCH Monitor

filippo.io/edwards25519 is a Go library implementing the edwards25519 elliptic curve with APIs for building cryptographic primitives. In versions 1.1.0 and earlier, MultiScalarMult produces invalid results or undefined behavior if the receiver is not the identity point.

Golang MySQL Github
NVD GitHub
CVE-2026-26323
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Arbitrary command execution in OpenClaw versions 2026.1.8 through 2026.2.13 allows attackers to execute shell commands when developers or CI systems run the update-clawtributors.ts maintenance script on repositories containing malicious commit metadata. The vulnerability stems from unsanitized interpolation of git author emails into shell commands via execSync, exploitable only by those with access to the development environment or source repository. Version 2026.2.14 patches the issue.

Node.js Github Command Injection +2
NVD GitHub
CVE-2026-26189
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Trivy Action versions 0.31.0 through 0.33.1 allow remote code execution on GitHub Actions runners due to insufficient input sanitization when constructing shell environment variable exports. An attacker with repository access can inject shell metacharacters through action inputs to achieve arbitrary command execution in the runner context. The vulnerability requires high privileges to exploit and is addressed in version 0.34.0.

Docker Github Command Injection +1
NVD GitHub
CVE-2026-25739
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Cross-site scripting in Indico prior to version 3.3.10 allows authenticated users to inject malicious scripts through material file uploads, potentially compromising other users' sessions or stealing sensitive data. The vulnerability affects Indico deployments using Flask-Multipass authentication and requires both user interaction and authenticated access to exploit. A patch is available, and administrators should upgrade to version 3.3.10 and update webserver configurations to enforce strict Content Security Policy for file downloads.

Nginx Github Flask +2
NVD GitHub
CVE-2026-1355
EPSS 0% CVSS 6.5
MEDIUM This Month

GitHub Enterprise Server versions before 3.20 contain an authorization bypass in the repository migration upload endpoint that permits authenticated attackers to inject malicious content into other users' migration exports. An attacker can overwrite a victim's migration archive and cause them to download compromised repository data during restoration or automated imports. No patch is currently available, affecting all versions prior to 3.20.

Github Enterprise Server
NVD GitHub
CVE-2026-0573
EPSS 0% CVSS 9.0
CRITICAL Act Now

URL redirection vulnerability in GitHub Enterprise Server allows attacker-controlled redirects through crafted URLs, potentially enabling credential theft via phishing.

Github RCE Enterprise Server
NVD GitHub
CVE-2026-1721
EPSS 0%
PATCH This Week

Summary A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the AI Playground's OAuth callback handler.

Github XSS
NVD GitHub
CVE-2026-21523
EPSS 0% CVSS 8.0
HIGH This Week

Authenticated users can exploit a race condition in GitHub Copilot and Visual Studio Code to execute arbitrary code remotely by manipulating file state between verification and use. This vulnerability affects users with network access to these development tools and requires user interaction to trigger. No patch is currently available to address this high-severity flaw.

Github Race Condition AI / ML +1
NVD
CVE-2026-21518
EPSS 0% CVSS 8.8
HIGH This Week

GitHub Copilot and Visual Studio Code are vulnerable to command injection attacks that allow unauthenticated attackers to bypass security features over the network through improper neutralization of special command elements. The vulnerability requires user interaction to exploit and could enable attackers to execute arbitrary commands with high impact on confidentiality, integrity, and availability. No patch is currently available for this issue.

Github Command Injection AI / ML +1
NVD
CVE-2026-21516
EPSS 0% CVSS 8.8
HIGH This Week

GitHub Copilot is vulnerable to command injection attacks that enable remote code execution without requiring authentication or user interaction beyond a click. An attacker can exploit this network-accessible vulnerability to execute arbitrary commands on affected systems. No patch is currently available for this high-severity vulnerability.

Github Command Injection AI / ML +1
NVD
CVE-2026-21257
EPSS 0% CVSS 8.0
HIGH This Week

GitHub Copilot and Visual Studio 2022 contain a command injection vulnerability that allows authenticated users to execute arbitrary commands through improper sanitization of special elements. An attacker with valid credentials can leverage user interaction to escalate privileges and gain elevated access across the network. No patch is currently available for this vulnerability.

Github Command Injection AI / ML +1
NVD
CVE-2026-21256
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in GitHub Copilot and Visual Studio 2022 via command injection allows unauthenticated attackers to execute arbitrary code over the network with user interaction. The vulnerability stems from improper sanitization of special elements in commands, enabling attackers to break out of intended command contexts and inject malicious payloads. No patch is currently available for this high-severity issue affecting both development environments.

Github Command Injection AI / ML +1
NVD
CVE-2026-25761
EPSS 0% CVSS 8.8
HIGH This Week

Command injection in GitHub Super-linter versions 6.0.0 through 8.3.0 allows attackers to execute arbitrary commands in workflow runner contexts by submitting pull requests with maliciously crafted filenames containing shell command substitution syntax. An attacker exploiting this vulnerability can access sensitive workflow credentials, including GITHUB_TOKEN, depending on permission configurations. The vulnerability affects Super-linter when used as a GitHub Action and has no available patch at this time.

Github Command Injection Super Linter
NVD GitHub
CVE-2026-25598
EPSS 0% CVSS 5.3
MEDIUM This Month

Harden-Runner versions prior to 2.14.2 fail to log outbound network connections made through sendto, sendmsg, and sendmmsg socket calls when audit mode is enabled, allowing attackers to exfiltrate data from GitHub Actions runners without detection. This integrity bypass affects users relying on Harden-Runner's egress policy auditing for security monitoring. A patch is available in version 2.14.2 and later.

Github Harden Runner Redhat
NVD GitHub
CVE-2026-1337
EPSS 0% CVSS 5.4
MEDIUM POC PATCH This Month

Neo4J versions up to 2026.01 contains a vulnerability that allows attackers to XSS if the user opens the logs in a tool that treats them as HTML (CVSS 5.4).

Github XSS Neo4j
NVD GitHub
CVE-2026-1664
EPSS 0%
PATCH Monitor

Summary An Insecure Direct Object Reference has been found to exist in `createHeaderBasedEmailResolver()` function within the Cloudflare Agents SDK.

Github
NVD GitHub
CVE-2026-25221
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

PolarLearn versions 0-PRERELEASE-15 and earlier lack proper state parameter validation in OAuth 2.0 authentication, enabling attackers to conduct login CSRF attacks against GitHub and Google login flows. An attacker can pre-authenticate a victim's session and trick them into logging into the attacker's account, causing the victim's data and academic progress to be stored on the attacker's account instead. Public exploit code exists for this vulnerability, and a patch is available.

Github CSRF Information Disclosure +1
NVD GitHub
CVE-2026-1699
EPSS 0% CVSS 10.0
CRITICAL POC Act Now

Supply chain vulnerability in Eclipse Theia GitHub Actions workflow. The preview.yml workflow uses pull_request_target with checkout, enabling malicious PRs to steal secrets. CVSS 10.0, PoC available.

Github Theia Website
NVD
CVE-2026-24889
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Arithmetic overflow in Soroban SDK versions up to 25.0.2 allows contracts using user-controlled range bounds in Bytes::slice, Vec::slice, or Prng::gen_range methods to operate on incorrect data ranges or generate unintended random numbers, potentially corrupting contract state. Developers who do not enable overflow-checks in their Rust configuration are vulnerable to this silent data corruption. A patch is available and should be applied immediately to affected Soroban contracts.

Github Rs Soroban Sdk
NVD GitHub
CVE-2026-24910
EPSS 0% CVSS 5.9
MEDIUM This Month

Bun versions prior to 1.3.5 allow attackers to bypass the trusted dependencies allowlist by creating non-npm packages with names matching legitimate packages, enabling potential code execution through dependency confusion attacks. This local vulnerability affects systems using Bun's package management where an attacker can craft malicious packages with identical names to trusted dependencies. No patch is currently available for affected Node.js and GitHub integrations.

Node.js Github
NVD
CVE-2026-24480
EPSS 0%
This Week

QGIS is a free, open source, cross platform geographical information system (GIS) The repository contains a GitHub Actions workflow called "pre-commit checks" that, before commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, was vulnerable to remote code execution and repository compromise because it used the `pull_request_target` trigger and then checked out and executed untrusted pull request code in a privileged context.

Github RCE
NVD GitHub
CVE-2026-23889
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Path traversal in pnpm's tarball extraction on Windows allows attackers to write files outside the intended package directory by exploiting incomplete path normalization that fails to block backslash-based traversal sequences. Public exploit code exists for this vulnerability, which affects Windows developers and CI/CD pipelines (GitHub Actions, Azure DevOps) and could result in overwriting sensitive configuration files like .npmrc or build configurations. A patch is available in pnpm version 10.28.1 and later.

Windows Node.js Azure +4
NVD GitHub
CVE-2025-11065
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A flaw was found in github.com/go-viper/mapstructure/v2, in the field processing component using mapstructure.WeakDecode. [CVSS 5.3 MEDIUM]

Github Information Disclosure Redhat +1
NVD GitHub
CVE-2026-0756
EPSS 1% CVSS 9.8
CRITICAL Act Now

github-kanban-mcp-server has a command injection in execAsync (EPSS 1.0%) enabling remote code execution on developer machines using the GitHub Kanban MCP integration.

Github RCE Command Injection +1
NVD
CVE-2026-24137
EPSS 0% CVSS 5.8
MEDIUM PATCH This Month

The Golang sigstore framework versions 1.10.3 and below fail to validate cache directory paths in the legacy TUF client, allowing a malicious TUF repository to overwrite arbitrary files on disk within the calling process's permission scope. This impacts direct users of the TUF client in sigstore/sigstore and older Cosign versions, though public Sigstore deployments are protected by metadata validation from trusted collaborators. No patch is currently available for this medium-severity path traversal vulnerability.

Golang Github Redhat +1
NVD GitHub
CVE-2025-69209
EPSS 0%
This Week

ArduinoCore-avr contains the source code and configuration files of the Arduino AVR Boards platform. A vulnerability in versions prior to 1.8.7 allows an attacker to trigger a stack-based buffer overflow when converting floating-point values to strings with high precision. By passing very large `decimalPlaces` values to the affected String constructors or concat methods, the `dtostrf` function writes beyond fixed-size stack buffers, causing memory corruption and denial of service. Under speci...

Github Buffer Overflow Stack Overflow +3
NVD GitHub
CVE-2025-56005
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

PLY (Python Lex-Yacc) library 3.11 has an unsafe feature enabling remote code execution through pickle deserialization of cached parser tables, with EPSS 0.91%.

Python Github RCE +5
NVD GitHub
CVE-2026-23644
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Path traversal in esm.sh CDN prior to version 0.0.0-20260116051925-c62ab83c589e allows unauthenticated remote attackers to write arbitrary files to the server through malicious tar archives, bypassing incomplete path sanitization. Public exploit code exists for this vulnerability. The issue stems from improper validation of absolute paths in tar file entries, enabling potential code execution or service disruption on affected systems.

Golang Github Path Traversal +2
NVD GitHub
CVE-2025-60021
EPSS 0% CVSS 9.8
CRITICAL Act Now

Apache bRPC versions before 1.15.0 contain a remote command injection vulnerability in the heap profiler built-in service, allowing attackers to execute arbitrary OS commands.

Apache Github Command Injection +1
NVD
CVE-2026-1002
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Improper URI path normalization in Vert.x Web's static file handler allows remote attackers to manipulate the cache and deny access to static files through specially crafted request URIs containing encoded path traversal sequences. An unauthenticated attacker can exploit this vulnerability over the network with no user interaction to cause denial of service by returning HTTP 404 responses for normally accessible files. Public exploit code exists and patches are available.

Github Vert.X Web Redhat
NVD GitHub VulDB
CVE-2026-22869
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Eigent multi-agent workflow CI pipeline (ci.yml) uses pull_request_target with checkout of untrusted PR code, enabling arbitrary code execution with repository write permissions from fork PRs. PoC available, patch available.

Github AI / ML Eigent
NVD GitHub
CVE-2025-14147
EPSS 0% CVSS 6.4
MEDIUM This Month

The Easy GitHub Gist Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter of the gist shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. [CVSS 6.4 MEDIUM]

WordPress Github XSS +1
NVD
CVE-2025-13744
EPSS 0% CVSS 5.4
MEDIUM This Month

An Improper Neutralization of Input During Web Page Generation vulnerability was identified in GitHub Enterprise Server that allowed attacker controlled HTML to be rendered by the Filter component (search) across GitHub that could be used to exfiltrate sensitive information. [CVSS 5.4 MEDIUM]

Github Enterprise Server
NVD GitHub
CVE-2025-61916
EPSS 0% CVSS 7.9
HIGH PATCH This Week

Spinnaker is an open source, multi-cloud continuous delivery platform. Versions prior to 2025.1.6, 2025.2.3, and 2025.3.0 are vulnerable to server-side request forgery. [CVSS 7.9 HIGH]

Docker Kubernetes Aws +4
NVD GitHub
CVE-2025-68619
EPSS 0% CVSS 7.2
HIGH POC PATCH This Week

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the appstore interface allow administrators to install npm packages through a REST API endpoint. [CVSS 7.2 HIGH]

Node.js Github Signal K Server +1
NVD GitHub
CVE-2025-52483
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Registrator, a GitHub app automating Julia package registration, contains critical shell injection and argument injection vulnerabilities in versions prior to 1.9.5 that can be exploited through malicious or injected clone URLs returned by GitHub. An unauthenticated remote attacker can achieve arbitrary code execution on systems running vulnerable versions with no user interaction required. No public exploits are confirmed, but the vulnerability is trivial to exploit given the direct code paths involved.

Command Injection RCE Code Injection +3
NVD GitHub
CVE-2025-52467
EPSS 0% CVSS 9.1
CRITICAL Act Now

pgai, a Python library for PostgreSQL-based RAG and agentic applications, contains a secrets exfiltration vulnerability (CVE-2025-52467) that allows unauthenticated remote attackers to extract all workflow secrets, including GITHUB_TOKEN credentials with repository write permissions. This vulnerability has a CVSS score of 9.1 (Critical) and affects pgai versions prior to commit 8eb3567; a patch is available and the vulnerability is not currently listed in CISA KEV, though the high CVSS and direct credential exposure indicate substantial real-world risk if the library is deployed in CI/CD environments.

Python Information Disclosure RCE +1
NVD GitHub
CVE-2025-49013
EPSS 1% CVSS 9.9
CRITICAL Act Now

A security vulnerability in WilderForge (CVSS 9.9). Critical severity with potential for significant impact on affected systems.

RCE Code Injection Github
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy