CVE-2026-22869: CWE-94: Improper Control of Generation of Code ('Code Injection') in eigent-ai eigent
Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permissions. The vulnerable workflow uses pull_request_target trigger combined with checkout of untrusted PR code. An attacker can exploit this to steal credentials, post comments, push code, or create releases.
AI Analysis
Technical Summary
CVE-2026-22869 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting the eigent-ai eigent product's continuous integration (CI) workflow. The root cause lies in the GitHub Actions workflow file (.github/workflows/ci.yml), which uses the pull_request_target event trigger. This trigger runs workflows in the context of the base branch, granting elevated permissions, but the workflow also checks out code from untrusted forked pull requests. This combination allows an attacker submitting a malicious pull request from a fork to execute arbitrary code within the CI environment without requiring authentication or user interaction. The attacker can leverage this to steal sensitive credentials stored as secrets in the repository, manipulate the repository by pushing unauthorized code changes, post comments, or even create releases. The vulnerability affects all versions of eigent prior to the commit bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5. The CVSS 4.0 score is 8.9 (high severity), reflecting the network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the vulnerability is considered highly exploitable due to the common use of GitHub Actions and forked pull requests in open source and enterprise development workflows. The vulnerability underscores the risks of misconfigured CI workflows that grant excessive permissions to untrusted code execution contexts.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of their software development lifecycle and source code integrity. Organizations using eigent in their CI pipelines may face unauthorized disclosure of sensitive credentials, including tokens and keys stored as GitHub secrets, leading to broader compromise of internal systems or cloud environments. Attackers could inject malicious code into the repository, potentially introducing backdoors or supply chain compromises that affect downstream consumers. The ability to create releases or push code unauthorizedly can disrupt software delivery and damage organizational reputation. Given the widespread adoption of GitHub and CI/CD pipelines in European tech sectors, this vulnerability could impact software vendors, financial institutions, government agencies, and critical infrastructure providers relying on eigent for automation. The risk is amplified in collaborative projects with external contributors or public repositories, common in open source and multinational enterprises. Failure to remediate promptly could lead to data breaches, service outages, and regulatory non-compliance under GDPR and other data protection laws.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and update their eigent CI workflows to avoid using the pull_request_target trigger when checking out code from untrusted forks. Instead, use the pull_request trigger, which runs workflows with the permissions of the contributor, limiting exposure. Restrict access to repository secrets by configuring GitHub Actions to not expose secrets to workflows triggered by forked pull requests. Implement strict permission boundaries in workflows, such as least privilege principles for tokens and credentials. Consider using GitHub's built-in security features like required reviews and branch protection rules to limit who can merge code. Regularly audit CI/CD configurations for insecure patterns and keep eigent updated to versions beyond bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5 once patches are available. Additionally, monitor CI logs for suspicious activity and employ runtime detection for anomalous behavior during builds. Educate developers and DevOps teams on secure CI practices to prevent similar misconfigurations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2026-22869: CWE-94: Improper Control of Generation of Code ('Code Injection') in eigent-ai eigent
Description
Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permissions. The vulnerable workflow uses pull_request_target trigger combined with checkout of untrusted PR code. An attacker can exploit this to steal credentials, post comments, push code, or create releases.
AI-Powered Analysis
Technical Analysis
CVE-2026-22869 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting the eigent-ai eigent product's continuous integration (CI) workflow. The root cause lies in the GitHub Actions workflow file (.github/workflows/ci.yml), which uses the pull_request_target event trigger. This trigger runs workflows in the context of the base branch, granting elevated permissions, but the workflow also checks out code from untrusted forked pull requests. This combination allows an attacker submitting a malicious pull request from a fork to execute arbitrary code within the CI environment without requiring authentication or user interaction. The attacker can leverage this to steal sensitive credentials stored as secrets in the repository, manipulate the repository by pushing unauthorized code changes, post comments, or even create releases. The vulnerability affects all versions of eigent prior to the commit bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5. The CVSS 4.0 score is 8.9 (high severity), reflecting the network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the vulnerability is considered highly exploitable due to the common use of GitHub Actions and forked pull requests in open source and enterprise development workflows. The vulnerability underscores the risks of misconfigured CI workflows that grant excessive permissions to untrusted code execution contexts.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of their software development lifecycle and source code integrity. Organizations using eigent in their CI pipelines may face unauthorized disclosure of sensitive credentials, including tokens and keys stored as GitHub secrets, leading to broader compromise of internal systems or cloud environments. Attackers could inject malicious code into the repository, potentially introducing backdoors or supply chain compromises that affect downstream consumers. The ability to create releases or push code unauthorizedly can disrupt software delivery and damage organizational reputation. Given the widespread adoption of GitHub and CI/CD pipelines in European tech sectors, this vulnerability could impact software vendors, financial institutions, government agencies, and critical infrastructure providers relying on eigent for automation. The risk is amplified in collaborative projects with external contributors or public repositories, common in open source and multinational enterprises. Failure to remediate promptly could lead to data breaches, service outages, and regulatory non-compliance under GDPR and other data protection laws.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and update their eigent CI workflows to avoid using the pull_request_target trigger when checking out code from untrusted forks. Instead, use the pull_request trigger, which runs workflows with the permissions of the contributor, limiting exposure. Restrict access to repository secrets by configuring GitHub Actions to not expose secrets to workflows triggered by forked pull requests. Implement strict permission boundaries in workflows, such as least privilege principles for tokens and credentials. Consider using GitHub's built-in security features like required reviews and branch protection rules to limit who can merge code. Regularly audit CI/CD configurations for insecure patterns and keep eigent updated to versions beyond bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5 once patches are available. Additionally, monitor CI logs for suspicious activity and employ runtime detection for anomalous behavior during builds. Educate developers and DevOps teams on secure CI practices to prevent similar misconfigurations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-12T16:20:16.747Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6966adfba60475309fb28999
Added to database: 1/13/2026, 8:41:31 PM
Last enriched: 1/21/2026, 2:28:54 AM
Last updated: 2/6/2026, 10:20:56 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2069: Stack-based Buffer Overflow in ggml-org llama.cpp
MediumCVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25763: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in opf openproject
CriticalCVE-2026-2068: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.