CVE-2026-31976: CWE-506: Embedded Malicious Code in xygeni xygeni-action
CVE-2026-31976 is a critical supply chain vulnerability in the GitHub Action 'xygeni-action' used by the Xygeni Scanner. An attacker with compromised GitHub App credentials injected obfuscated malicious shell code into the action. yml file via unmerged pull requests. Although the PRs were blocked, the attacker moved the mutable v5 tag to point to the malicious commit, causing any workflow referencing xygeni/xygeni-action@v5 between March 3 and March 10, 2026, to execute a command-and-control implant. This implant allowed arbitrary command execution on CI runners for up to 180 seconds per workflow run without requiring authentication or user interaction. The vulnerability represents a high-severity supply chain compromise with a CVSS 9. 3 score. Organizations using this GitHub Action during the affected window are at risk of remote code execution and potential further compromise of their CI/CD environments.
AI Analysis
Technical Summary
CVE-2026-31976 is a critical supply chain vulnerability affecting the GitHub Action 'xygeni-action', a component of the Xygeni Scanner. On March 3, 2026, an attacker who gained access to compromised GitHub App credentials created multiple pull requests injecting obfuscated shell code into the action.yml file. Although branch protection rules prevented these pull requests from being merged, the attacker exploited the mutable nature of the v5 tag by moving it to point to a malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) present in the repository's git object store. Consequently, any GitHub Actions workflow referencing xygeni/xygeni-action@v5 during the affected period (March 3–10, 2026) would fetch and execute this malicious code. The injected code functioned as a command-and-control (C2) implant, granting the attacker arbitrary command execution capabilities on the continuous integration (CI) runner for up to 180 seconds per workflow run. This attack is classified under CWE-506 (Embedded Malicious Code) and represents a sophisticated tag poisoning supply chain compromise. The vulnerability requires no authentication or user interaction to exploit and affects all users referencing the vulnerable tag in their workflows. The CVSS 4.0 base score is 9.3, reflecting its critical severity due to network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability.
Potential Impact
The impact of CVE-2026-31976 is significant for organizations worldwide that use the xygeni-action GitHub Action in their CI/CD pipelines. Exploitation allows attackers to execute arbitrary commands on CI runners, potentially leading to theft of sensitive data, injection of further malicious code, lateral movement within the development environment, and disruption of build and deployment processes. Since CI runners often have access to source code, credentials, and deployment environments, this can lead to full compromise of software supply chains and downstream applications. The ephemeral 180-second execution window per workflow run may limit some attack persistence but is sufficient for data exfiltration and implant deployment. The supply chain nature of the attack means that even organizations with strong perimeter defenses are vulnerable if they use the affected action version. This can undermine trust in automated build systems and cause widespread operational and reputational damage.
Mitigation Recommendations
To mitigate this threat, organizations should immediately audit their GitHub workflows for references to xygeni/xygeni-action@v5 and update to a known clean and patched version once available. Since no patch links are provided yet, temporarily pin workflows to a specific commit hash or an earlier trusted tag version predating March 3, 2026. Implement strict GitHub App credential management, including rotating credentials and enforcing least privilege principles to prevent unauthorized tag modifications. Enable branch protection rules and require signed commits and tags to prevent unauthorized changes. Monitor CI runner logs for unusual command execution patterns and network connections indicative of C2 activity. Consider isolating CI runners in segmented environments with limited network access to reduce impact. Finally, incorporate supply chain security best practices such as reproducible builds, artifact signing, and dependency scanning to detect and prevent similar attacks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, India, South Korea
CVE-2026-31976: CWE-506: Embedded Malicious Code in xygeni xygeni-action
Description
CVE-2026-31976 is a critical supply chain vulnerability in the GitHub Action 'xygeni-action' used by the Xygeni Scanner. An attacker with compromised GitHub App credentials injected obfuscated malicious shell code into the action. yml file via unmerged pull requests. Although the PRs were blocked, the attacker moved the mutable v5 tag to point to the malicious commit, causing any workflow referencing xygeni/xygeni-action@v5 between March 3 and March 10, 2026, to execute a command-and-control implant. This implant allowed arbitrary command execution on CI runners for up to 180 seconds per workflow run without requiring authentication or user interaction. The vulnerability represents a high-severity supply chain compromise with a CVSS 9. 3 score. Organizations using this GitHub Action during the affected window are at risk of remote code execution and potential further compromise of their CI/CD environments.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-31976 is a critical supply chain vulnerability affecting the GitHub Action 'xygeni-action', a component of the Xygeni Scanner. On March 3, 2026, an attacker who gained access to compromised GitHub App credentials created multiple pull requests injecting obfuscated shell code into the action.yml file. Although branch protection rules prevented these pull requests from being merged, the attacker exploited the mutable nature of the v5 tag by moving it to point to a malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) present in the repository's git object store. Consequently, any GitHub Actions workflow referencing xygeni/xygeni-action@v5 during the affected period (March 3–10, 2026) would fetch and execute this malicious code. The injected code functioned as a command-and-control (C2) implant, granting the attacker arbitrary command execution capabilities on the continuous integration (CI) runner for up to 180 seconds per workflow run. This attack is classified under CWE-506 (Embedded Malicious Code) and represents a sophisticated tag poisoning supply chain compromise. The vulnerability requires no authentication or user interaction to exploit and affects all users referencing the vulnerable tag in their workflows. The CVSS 4.0 base score is 9.3, reflecting its critical severity due to network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability.
Potential Impact
The impact of CVE-2026-31976 is significant for organizations worldwide that use the xygeni-action GitHub Action in their CI/CD pipelines. Exploitation allows attackers to execute arbitrary commands on CI runners, potentially leading to theft of sensitive data, injection of further malicious code, lateral movement within the development environment, and disruption of build and deployment processes. Since CI runners often have access to source code, credentials, and deployment environments, this can lead to full compromise of software supply chains and downstream applications. The ephemeral 180-second execution window per workflow run may limit some attack persistence but is sufficient for data exfiltration and implant deployment. The supply chain nature of the attack means that even organizations with strong perimeter defenses are vulnerable if they use the affected action version. This can undermine trust in automated build systems and cause widespread operational and reputational damage.
Mitigation Recommendations
To mitigate this threat, organizations should immediately audit their GitHub workflows for references to xygeni/xygeni-action@v5 and update to a known clean and patched version once available. Since no patch links are provided yet, temporarily pin workflows to a specific commit hash or an earlier trusted tag version predating March 3, 2026. Implement strict GitHub App credential management, including rotating credentials and enforcing least privilege principles to prevent unauthorized tag modifications. Enable branch protection rules and require signed commits and tags to prevent unauthorized changes. Monitor CI runner logs for unusual command execution patterns and network connections indicative of C2 activity. Consider isolating CI runners in segmented environments with limited network access to reduce impact. Finally, incorporate supply chain security best practices such as reproducible builds, artifact signing, and dependency scanning to detect and prevent similar attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-10T15:40:10.487Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b1c9b82f860ef9436f46e8
Added to database: 3/11/2026, 7:59:52 PM
Last enriched: 3/19/2026, 2:18:43 AM
Last updated: 4/26/2026, 1:53:47 AM
Views: 232
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.