Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
xygeni-action v5 tag poisoned with C2 backdoor
Vulnerability Description
xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into action.yml. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable v5 tag to point at the malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) from one of the unmerged PRs. This commit remained in the repository's git object store, and any workflow referencing @v5 would fetch and execute it. This is a supply chain compromise via tag poisoning. Any GitHub Actions workflow referencing xygeni/xygeni-action@v5 during the affected window (approximately March 3–10, 2026) executed a C2 implant that granted the attacker arbitrary command execution on the CI runner for up to 180 seconds per workflow run.
CVSS Information
N/A
Vulnerability Type
内嵌的恶意代码
Vulnerability Title
xygeni-action 安全漏洞
Vulnerability Description
xygeni-action是Xygeni开源的一个GitHub代码安全扫描工作流插件。 xygeni-action存在安全漏洞,该漏洞源于标签投毒,可能导致供应链攻击,使攻击者能够在CI运行器上执行任意命令。
CVSS Information
N/A
Vulnerability Type
N/A