CVE-2026-25598: CWE-778: Insufficient Logging in step-security harden-runner
CVE-2026-25598 is a medium-severity vulnerability in the step-security Harden-Runner GitHub Action prior to version 2. 14. 2. It allows outbound network connections made via certain socket system calls (sendto, sendmsg, sendmmsg) to evade audit logging when egress-policy is set to audit. This insufficient logging weakness (CWE-778) can undermine the visibility of potentially malicious outbound traffic in CI/CD environments using Harden-Runner. The vulnerability does not require authentication or user interaction and has a CVSS score of 6. 3. It is fixed in version 2. 14. 2.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-25598 affects the step-security Harden-Runner GitHub Action, a security agent designed to function similarly to an Endpoint Detection and Response (EDR) system for GitHub Actions runners. Harden-Runner monitors and enforces security policies during CI/CD workflows. Prior to version 2.14.2, Harden-Runner's egress-policy set to 'audit' intended to log all outbound network connections for security monitoring. However, a flaw in the logging mechanism allows outbound traffic that uses specific socket system calls—namely sendto, sendmsg, and sendmmsg—to bypass audit logging. These system calls are commonly used for sending UDP packets or multiple messages in a single call, which can be exploited to evade detection. This constitutes an instance of CWE-778 (Insufficient Logging), where critical security-relevant events are not properly recorded, reducing the ability to detect or investigate suspicious activity. The vulnerability does not require any privileges or user interaction, making it remotely exploitable in environments where Harden-Runner is deployed. Although no known exploits are reported in the wild, the risk lies in attackers or malicious insiders leveraging this gap to exfiltrate data or communicate with external command-and-control servers without triggering alerts. The issue is resolved in Harden-Runner version 2.14.2, which corrects the logging behavior to include these socket calls. The CVSS 4.0 base score is 6.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on integrity.
Potential Impact
For European organizations, especially those relying on GitHub Actions for CI/CD pipelines and employing Harden-Runner for security monitoring, this vulnerability can significantly reduce visibility into outbound network traffic. This lack of audit logging can allow attackers to stealthily exfiltrate sensitive intellectual property, credentials, or configuration data, or maintain covert command-and-control channels. The impact is particularly critical for sectors with stringent compliance and data protection requirements, such as finance, healthcare, and critical infrastructure. Reduced logging undermines incident detection and forensic investigations, increasing the risk of prolonged undetected breaches. Additionally, organizations may face regulatory consequences if audit trails are incomplete, violating GDPR or other local data protection laws. While the vulnerability does not directly compromise system integrity or availability, the diminished monitoring capability can facilitate more severe downstream attacks.
Mitigation Recommendations
European organizations should immediately upgrade Harden-Runner to version 2.14.2 or later to ensure comprehensive audit logging of all outbound network traffic, including traffic using sendto, sendmsg, and sendmmsg socket calls. In addition to patching, organizations should: 1) Review and tighten egress policies in CI/CD environments to restrict unnecessary outbound connections. 2) Implement network-level monitoring and logging to complement Harden-Runner’s capabilities, such as using network intrusion detection systems (NIDS) or egress firewalls that can detect anomalous UDP or multi-message traffic. 3) Conduct regular audits of CI/CD runner configurations and logs to identify gaps or suspicious activity. 4) Employ anomaly detection tools that analyze network traffic patterns for unusual behavior that might bypass application-level logging. 5) Educate DevOps and security teams about this vulnerability and the importance of layered monitoring. 6) Integrate Harden-Runner logs with centralized Security Information and Event Management (SIEM) systems for correlation and alerting. These steps will help mitigate the risk of stealthy data exfiltration or command-and-control communication attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2026-25598: CWE-778: Insufficient Logging in step-security harden-runner
Description
CVE-2026-25598 is a medium-severity vulnerability in the step-security Harden-Runner GitHub Action prior to version 2. 14. 2. It allows outbound network connections made via certain socket system calls (sendto, sendmsg, sendmmsg) to evade audit logging when egress-policy is set to audit. This insufficient logging weakness (CWE-778) can undermine the visibility of potentially malicious outbound traffic in CI/CD environments using Harden-Runner. The vulnerability does not require authentication or user interaction and has a CVSS score of 6. 3. It is fixed in version 2. 14. 2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-25598 affects the step-security Harden-Runner GitHub Action, a security agent designed to function similarly to an Endpoint Detection and Response (EDR) system for GitHub Actions runners. Harden-Runner monitors and enforces security policies during CI/CD workflows. Prior to version 2.14.2, Harden-Runner's egress-policy set to 'audit' intended to log all outbound network connections for security monitoring. However, a flaw in the logging mechanism allows outbound traffic that uses specific socket system calls—namely sendto, sendmsg, and sendmmsg—to bypass audit logging. These system calls are commonly used for sending UDP packets or multiple messages in a single call, which can be exploited to evade detection. This constitutes an instance of CWE-778 (Insufficient Logging), where critical security-relevant events are not properly recorded, reducing the ability to detect or investigate suspicious activity. The vulnerability does not require any privileges or user interaction, making it remotely exploitable in environments where Harden-Runner is deployed. Although no known exploits are reported in the wild, the risk lies in attackers or malicious insiders leveraging this gap to exfiltrate data or communicate with external command-and-control servers without triggering alerts. The issue is resolved in Harden-Runner version 2.14.2, which corrects the logging behavior to include these socket calls. The CVSS 4.0 base score is 6.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on integrity.
Potential Impact
For European organizations, especially those relying on GitHub Actions for CI/CD pipelines and employing Harden-Runner for security monitoring, this vulnerability can significantly reduce visibility into outbound network traffic. This lack of audit logging can allow attackers to stealthily exfiltrate sensitive intellectual property, credentials, or configuration data, or maintain covert command-and-control channels. The impact is particularly critical for sectors with stringent compliance and data protection requirements, such as finance, healthcare, and critical infrastructure. Reduced logging undermines incident detection and forensic investigations, increasing the risk of prolonged undetected breaches. Additionally, organizations may face regulatory consequences if audit trails are incomplete, violating GDPR or other local data protection laws. While the vulnerability does not directly compromise system integrity or availability, the diminished monitoring capability can facilitate more severe downstream attacks.
Mitigation Recommendations
European organizations should immediately upgrade Harden-Runner to version 2.14.2 or later to ensure comprehensive audit logging of all outbound network traffic, including traffic using sendto, sendmsg, and sendmmsg socket calls. In addition to patching, organizations should: 1) Review and tighten egress policies in CI/CD environments to restrict unnecessary outbound connections. 2) Implement network-level monitoring and logging to complement Harden-Runner’s capabilities, such as using network intrusion detection systems (NIDS) or egress firewalls that can detect anomalous UDP or multi-message traffic. 3) Conduct regular audits of CI/CD runner configurations and logs to identify gaps or suspicious activity. 4) Employ anomaly detection tools that analyze network traffic patterns for unusual behavior that might bypass application-level logging. 5) Educate DevOps and security teams about this vulnerability and the importance of layered monitoring. 6) Integrate Harden-Runner logs with centralized Security Information and Event Management (SIEM) systems for correlation and alerting. These steps will help mitigate the risk of stealthy data exfiltration or command-and-control communication attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-03T01:02:46.717Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698a36084b57a58fa16ab20a
Added to database: 2/9/2026, 7:31:20 PM
Last enriched: 2/17/2026, 9:46:23 AM
Last updated: 3/26/2026, 9:39:23 PM
Views: 155
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.