Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25598: CWE-778: Insufficient Logging in step-security harden-runner

0
Medium
VulnerabilityCVE-2026-25598cvecve-2026-25598cwe-778
Published: Mon Feb 09 2026 (02/09/2026, 18:58:57 UTC)
Source: CVE Database V5
Vendor/Project: step-security
Product: harden-runner

Description

CVE-2026-25598 is a medium-severity vulnerability in the step-security Harden-Runner GitHub Action prior to version 2. 14. 2. It allows outbound network connections made via certain socket system calls (sendto, sendmsg, sendmmsg) to evade audit logging when egress-policy is set to audit. This insufficient logging weakness (CWE-778) can undermine the visibility of potentially malicious outbound traffic in CI/CD environments using Harden-Runner. The vulnerability does not require authentication or user interaction and has a CVSS score of 6. 3. It is fixed in version 2. 14. 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:46:23 UTC

Technical Analysis

The vulnerability identified as CVE-2026-25598 affects the step-security Harden-Runner GitHub Action, a security agent designed to function similarly to an Endpoint Detection and Response (EDR) system for GitHub Actions runners. Harden-Runner monitors and enforces security policies during CI/CD workflows. Prior to version 2.14.2, Harden-Runner's egress-policy set to 'audit' intended to log all outbound network connections for security monitoring. However, a flaw in the logging mechanism allows outbound traffic that uses specific socket system calls—namely sendto, sendmsg, and sendmmsg—to bypass audit logging. These system calls are commonly used for sending UDP packets or multiple messages in a single call, which can be exploited to evade detection. This constitutes an instance of CWE-778 (Insufficient Logging), where critical security-relevant events are not properly recorded, reducing the ability to detect or investigate suspicious activity. The vulnerability does not require any privileges or user interaction, making it remotely exploitable in environments where Harden-Runner is deployed. Although no known exploits are reported in the wild, the risk lies in attackers or malicious insiders leveraging this gap to exfiltrate data or communicate with external command-and-control servers without triggering alerts. The issue is resolved in Harden-Runner version 2.14.2, which corrects the logging behavior to include these socket calls. The CVSS 4.0 base score is 6.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on integrity.

Potential Impact

For European organizations, especially those relying on GitHub Actions for CI/CD pipelines and employing Harden-Runner for security monitoring, this vulnerability can significantly reduce visibility into outbound network traffic. This lack of audit logging can allow attackers to stealthily exfiltrate sensitive intellectual property, credentials, or configuration data, or maintain covert command-and-control channels. The impact is particularly critical for sectors with stringent compliance and data protection requirements, such as finance, healthcare, and critical infrastructure. Reduced logging undermines incident detection and forensic investigations, increasing the risk of prolonged undetected breaches. Additionally, organizations may face regulatory consequences if audit trails are incomplete, violating GDPR or other local data protection laws. While the vulnerability does not directly compromise system integrity or availability, the diminished monitoring capability can facilitate more severe downstream attacks.

Mitigation Recommendations

European organizations should immediately upgrade Harden-Runner to version 2.14.2 or later to ensure comprehensive audit logging of all outbound network traffic, including traffic using sendto, sendmsg, and sendmmsg socket calls. In addition to patching, organizations should: 1) Review and tighten egress policies in CI/CD environments to restrict unnecessary outbound connections. 2) Implement network-level monitoring and logging to complement Harden-Runner’s capabilities, such as using network intrusion detection systems (NIDS) or egress firewalls that can detect anomalous UDP or multi-message traffic. 3) Conduct regular audits of CI/CD runner configurations and logs to identify gaps or suspicious activity. 4) Employ anomaly detection tools that analyze network traffic patterns for unusual behavior that might bypass application-level logging. 5) Educate DevOps and security teams about this vulnerability and the importance of layered monitoring. 6) Integrate Harden-Runner logs with centralized Security Information and Event Management (SIEM) systems for correlation and alerting. These steps will help mitigate the risk of stealthy data exfiltration or command-and-control communication attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-03T01:02:46.717Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a36084b57a58fa16ab20a

Added to database: 2/9/2026, 7:31:20 PM

Last enriched: 2/17/2026, 9:46:23 AM

Last updated: 3/26/2026, 9:39:23 PM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses