Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34041: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in nektos act

0
High
VulnerabilityCVE-2026-34041cvecve-2026-34041cwe-74
Published: Tue Mar 31 2026 (03/31/2026, 01:43:25 UTC)
Source: CVE Database V5
Vendor/Project: nektos
Product: act

Description

CVE-2026-34041 is a high-severity injection vulnerability in versions of the nektos act tool prior to 0. 2. 86. The tool, which allows local execution of GitHub Actions workflows, improperly processes deprecated workflow commands ::set-env:: and ::add-path::. An attacker able to inject untrusted data into a workflow step's stdout can exploit this to set arbitrary environment variables or alter the PATH for subsequent steps, potentially compromising the workflow execution environment. This vulnerability does not require privileges but does require user interaction and can lead to significant confidentiality, integrity, and availability impacts. The issue was patched in version 0. 2. 86. Organizations using act for local CI/CD testing should upgrade immediately and audit workflows for untrusted input handling.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 19:19:58 UTC

Technical Analysis

The vulnerability identified as CVE-2026-34041 affects the nektos act project, a tool designed to run GitHub Actions workflows locally. Prior to version 0.2.86, act unconditionally processes the deprecated workflow commands ::set-env:: and ::add-path::. These commands were disabled in GitHub Actions due to environment injection risks but remained active in act. When a workflow step outputs untrusted data to stdout, an attacker can inject these commands, which act interprets, allowing them to set arbitrary environment variables or modify the PATH environment variable for all subsequent steps in the job. This improper neutralization of special elements in output (classified under CWE-74) leads to an injection vulnerability that can be exploited remotely without authentication but requires user interaction (running the workflow). The vulnerability affects all versions of act before 0.2.86 and can compromise the confidentiality, integrity, and availability of the local CI/CD environment by enabling malicious code execution or environment manipulation. The issue was publicly disclosed and patched in version 0.2.86. No known exploits in the wild have been reported yet. The CVSS v4.0 score is 7.7 (high), reflecting the ease of exploitation and potential impact. This vulnerability is particularly relevant for developers and organizations using act to test GitHub Actions workflows locally, especially when workflows process untrusted input.

Potential Impact

The exploitation of CVE-2026-34041 can have significant impacts on organizations using nektos act for local CI/CD pipeline testing. Attackers can inject malicious environment variables or alter the PATH, potentially leading to execution of arbitrary code in subsequent workflow steps. This compromises the integrity of the build and test environment, possibly allowing attackers to escalate privileges, exfiltrate sensitive information, or disrupt the build process, affecting availability. Since act is used locally, the threat primarily targets developer machines or CI environments that rely on act for testing workflows before deployment. If attackers can supply or influence workflow inputs, they can manipulate the environment to bypass security controls or introduce malicious artifacts. This can lead to supply chain risks if compromised workflows are later pushed to production. The vulnerability’s impact spans confidentiality, integrity, and availability, making it critical for organizations to address promptly to maintain secure development pipelines.

Mitigation Recommendations

To mitigate this vulnerability, organizations and developers should immediately upgrade nektos act to version 0.2.86 or later, where the processing of deprecated ::set-env:: and ::add-path:: commands has been disabled. Additionally, workflows should be audited to ensure they do not echo untrusted or user-controlled data to stdout, particularly data that could be interpreted as workflow commands. Implement strict input validation and sanitization in workflows to prevent injection of special commands. Avoid using deprecated workflow commands and migrate to the recommended environment variable and path management methods provided by GitHub Actions. Limit the use of act to trusted workflows and environments, and consider isolating local CI/CD testing environments to reduce risk exposure. Monitoring and logging of workflow executions can help detect anomalous environment changes. Finally, educate developers about the risks of injecting untrusted data into workflow outputs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-25T15:29:04.744Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cc1e09e6bfc5ba1d33b7f4

Added to database: 3/31/2026, 7:18:33 PM

Last enriched: 3/31/2026, 7:19:58 PM

Last updated: 3/31/2026, 10:15:11 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses