Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32947: CWE-693: Protection Mechanism Failure in step-security harden-runner

0
Medium
VulnerabilityCVE-2026-32947cvecve-2026-32947cwe-693cwe-863
Published: Fri Mar 20 2026 (03/20/2026, 04:03:03 UTC)
Source: CVE Database V5
Vendor/Project: step-security
Product: harden-runner

Description

Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. In versions 2.15.1 and below, a DNS over HTTPS (DoH) vulnerability allows attackers to bypass egress-policy: block network restrictions by tunneling exfiltrated data through permitted HTTPS endpoints like dns.google. The attack works by encoding sensitive data (e.g., the runner's hostname) as subdomains in DoH queries, which appear as legitimate HTTPS traffic to Harden-Runner's domain-based filtering but are ultimately forwarded to an attacker-controlled domain. This effectively enables data exfiltration without directly connecting to any blocked destination. Exploitation requires the attacker to already have code execution within the GitHub Actions workflow. The issue was fixed in version 2.16.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 05:10:21 UTC

Technical Analysis

The vulnerability identified as CVE-2026-32947 affects step-security's harden-runner, a security agent designed to protect GitHub Actions runners by enforcing egress network policies. In versions 2.15.1 and earlier, an attacker who has already gained code execution within a GitHub Actions workflow can exploit a DNS over HTTPS (DoH) bypass. Harden-Runner relies on domain-based filtering to block unauthorized network egress; however, DoH queries to allowed HTTPS endpoints like dns.google are permitted. The attacker encodes sensitive information, such as the runner's hostname, into subdomains of DoH queries. These queries appear as normal HTTPS traffic to the hardened runner, bypassing egress restrictions and forwarding the data to attacker-controlled domains. This method effectively tunnels exfiltrated data through trusted HTTPS channels, circumventing network blocklists. The vulnerability stems from a protection mechanism failure (CWE-693) and improper authorization (CWE-863) in the filtering logic. Exploitation requires prior code execution in the workflow, limiting initial attack vectors but enabling stealthy data leakage once compromised. The issue was addressed in harden-runner version 2.16.0 by improving DoH traffic inspection and blocking unauthorized tunneling attempts.

Potential Impact

This vulnerability allows attackers with existing code execution in GitHub Actions workflows to exfiltrate sensitive data stealthily, bypassing egress network restrictions enforced by harden-runner. The impact includes potential leakage of confidential information such as internal hostnames, environment details, or secrets accessible within the runner environment. Since GitHub Actions workflows often handle critical build and deployment processes, attackers can leverage this to gather intelligence or prepare further attacks. The bypass of network restrictions undermines the security posture of organizations relying on harden-runner to enforce strict egress policies, increasing the risk of data breaches and compliance violations. Although exploitation requires prior code execution, the ability to tunnel data covertly through trusted HTTPS endpoints complicates detection and response efforts. Organizations using vulnerable versions face increased risk of stealthy data exfiltration, especially in environments with sensitive intellectual property or regulated data.

Mitigation Recommendations

The primary mitigation is to upgrade harden-runner to version 2.16.0 or later, where the vulnerability is fixed. Organizations should audit their GitHub Actions workflows to ensure no unauthorized code execution is possible, as exploitation requires such access. Implement strict access controls and code review processes for workflows to minimize the risk of initial compromise. Additionally, monitor network traffic for unusual DoH query patterns or high volumes of DNS queries to trusted endpoints like dns.google, which may indicate tunneling attempts. Consider deploying enhanced network monitoring tools capable of inspecting DoH traffic content or metadata. Employ multi-layered egress filtering that includes behavioral analysis rather than relying solely on domain-based allowlists. Finally, maintain up-to-date security agents and regularly review CI/CD pipeline security configurations to detect and prevent misuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T00:05:53.284Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcd2fce32a4fbe5f2df417

Added to database: 3/20/2026, 4:54:20 AM

Last enriched: 3/20/2026, 5:10:21 AM

Last updated: 3/21/2026, 2:05:02 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses