Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-44219— ciguard: SCA HTTP client reads response body without size cap

CVSS 3.7 · Low EPSS 0.04% · P12

Affected Version Matrix 1

VendorProductVersion RangeStatus
Jo-Jo98ciguard>= 0.6.0, < 0.8.2affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-44219

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ciguard: SCA HTTP client reads response body without size cap
Source: NVD (National Vulnerability Database)
Vulnerability Description
ciguard is a static security auditor for CI/CD pipelines. From 0.6.0 to 0.8.1, both SCA HTTP clients (src/ciguard/analyzer/sca/osv.py and src/ciguard/analyzer/sca/endoflife.py) call payload = json.loads(resp.read().decode('utf-8')) without a maximum-bytes cap. A hostile or compromised endoflife.date / OSV.dev (or a successful TLS MITM) could return a multi-GB response, exhausting the ciguard process's memory. This vulnerability is fixed in 0.8.2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
不加限制或调节的资源分配
Source: NVD (National Vulnerability Database)
Vulnerability Title
ciguard 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ciguard是Johannes Moore个人开发者的一款CI/CD管道安全审计与可视化工具。 ciguard 0.6.0至0.8.1版本存在安全漏洞,该漏洞源于SCA HTTP客户端调用json.loads时未设置最大字节限制,可能导致恶意或受损的endpoint返回多GB响应,耗尽进程内存。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Jo-Jo98ciguard >= 0.6.0, < 0.8.2 -

II. Public POCs for CVE-2026-44219

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-44219

登录查看更多情报信息。

Same Patch Batch · Jo-Jo98 · 2026-05-12 · 3 CVEs total

CVE-2026-442203.2 LOWciguard: discover_pipeline_files follows symlinks out of scan root
CVE-2026-442183.0 LOWciguard: Container image runs as root (no USER directive)

IV. Related Vulnerabilities

V. Comments for CVE-2026-44219

No comments yet


Leave a comment