Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34243: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in njzjz wenxian

0
Critical
VulnerabilityCVE-2026-34243cvecve-2026-34243cwe-77cwe-78
Published: Tue Mar 31 2026 (03/31/2026, 15:49:27 UTC)
Source: CVE Database V5
Vendor/Project: njzjz
Product: wenxian

Description

wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allowing potential command injection and arbitrary code execution on the runner. At time of publication, there are no publicly available patches.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 16:38:22 UTC

Technical Analysis

CVE-2026-34243 is a critical security vulnerability identified in the njzjz wenxian tool, which is used to generate BIBTEX files from academic identifiers like DOI, PMID, arXiv ID, or paper titles. The vulnerability exists in versions 0.3.1 and earlier, specifically within a GitHub Actions workflow that processes user input from issue comments (issue_comment.body). This input is incorporated directly into shell commands without proper sanitization or neutralization of special characters, leading to command injection (CWE-77 and CWE-78). An attacker can craft malicious issue comments that execute arbitrary commands on the GitHub Actions runner environment, potentially gaining full control over the runner's system. The vulnerability requires no authentication or user interaction, making it remotely exploitable by anyone who can submit issue comments. The CVSS v3.1 score of 9.8 reflects the vulnerability's criticality, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact spans confidentiality, integrity, and availability, as arbitrary code execution could lead to data theft, modification, or denial of service. At the time of disclosure, no patches or fixes are publicly available, and no active exploitation has been reported. The vulnerability highlights the risks of unsanitized input in CI/CD workflows and the importance of secure coding practices in automation scripts.

Potential Impact

The potential impact of CVE-2026-34243 is severe for organizations utilizing the wenxian tool within their CI/CD pipelines, especially those leveraging GitHub Actions for automation. Successful exploitation allows attackers to execute arbitrary commands on the runner environment, which can lead to full compromise of the build infrastructure. This can result in unauthorized access to sensitive data, injection of malicious code into software builds, disruption of development workflows, and potential lateral movement within corporate networks. Since GitHub Actions runners often have access to source code repositories, credentials, and deployment environments, the breach could cascade into broader organizational security incidents. The vulnerability's ease of exploitation and lack of required privileges amplify the risk, making it attractive for attackers aiming to compromise open source projects or organizations relying on automated bibliographic data generation. The absence of patches increases exposure duration, necessitating immediate mitigations to prevent exploitation. Additionally, compromised runners could be used to launch further attacks or distribute malware, amplifying the threat landscape.

Mitigation Recommendations

To mitigate CVE-2026-34243, organizations should take immediate and specific actions beyond generic advice: 1) Disable or restrict the vulnerable GitHub Actions workflows that process issue comments until a secure patch or update is available. 2) Implement strict input validation and sanitization on all user-supplied data, especially those incorporated into shell commands or scripts. 3) Use safer alternatives to shell command interpolation, such as parameterized APIs or dedicated libraries that avoid shell invocation. 4) Isolate GitHub Actions runners in restricted environments with minimal privileges and no access to sensitive resources to limit potential damage. 5) Monitor GitHub repositories for suspicious issue comments or unusual workflow executions indicative of exploitation attempts. 6) Consider migrating to self-hosted runners with enhanced security controls if public runners are used. 7) Engage with the wenxian project maintainers to track patch releases and apply updates promptly once available. 8) Review and audit all CI/CD workflows for similar injection risks to prevent analogous vulnerabilities. These targeted measures will reduce the attack surface and protect critical development infrastructure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-26T16:22:29.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbf4f5e6bfc5ba1d2745cd

Added to database: 3/31/2026, 4:23:17 PM

Last enriched: 3/31/2026, 4:38:22 PM

Last updated: 4/1/2026, 3:51:08 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses