Search criteria
2 vulnerabilities by eigent-ai
CVE-2026-22869 (GCVE-0-2026-22869)
Vulnerability from cvelistv5 – Published: 2026-01-13 20:38 – Updated: 2026-01-14 23:26
VLAI?
Title
Eigent Allows Arbitrary Code Execution via pull_request_target CI Workflow
Summary
Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permissions. The vulnerable workflow uses pull_request_target trigger combined with checkout of untrusted PR code. An attacker can exploit this to steal credentials, post comments, push code, or create releases.
Severity ?
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-22869",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-14T23:25:39.048462Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-14T23:26:18.334Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "eigent",
"vendor": "eigent-ai",
"versions": [
{
"status": "affected",
"version": "\u003c bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permissions. The vulnerable workflow uses pull_request_target trigger combined with checkout of untrusted PR code. An attacker can exploit this to steal credentials, post comments, push code, or create releases."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-13T20:38:42.662Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/eigent-ai/eigent/security/advisories/GHSA-gvh4-93cq-5xxp",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/eigent-ai/eigent/security/advisories/GHSA-gvh4-93cq-5xxp"
},
{
"name": "https://github.com/eigent-ai/eigent/pull/836",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/eigent-ai/eigent/pull/836"
},
{
"name": "https://github.com/eigent-ai/eigent/pull/837",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/eigent-ai/eigent/pull/837"
},
{
"name": "https://github.com/eigent-ai/eigent/commit/bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/eigent-ai/eigent/commit/bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5"
}
],
"source": {
"advisory": "GHSA-gvh4-93cq-5xxp",
"discovery": "UNKNOWN"
},
"title": "Eigent Allows Arbitrary Code Execution via pull_request_target CI Workflow"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-22869",
"datePublished": "2026-01-13T20:38:42.662Z",
"dateReserved": "2026-01-12T16:20:16.747Z",
"dateUpdated": "2026-01-14T23:26:18.334Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-68952 (GCVE-0-2025-68952)
Vulnerability from cvelistv5 – Published: 2025-12-27 00:37 – Updated: 2025-12-29 15:53
VLAI?
Title
1-click Remote Code Execution (RCE) vulnerability in Eigent
Summary
Eigent is a multi-agent Workforce. In version 0.0.60, a 1-click Remote Code Execution (RCE) vulnerability has been identified in Eigent. This vulnerability allows an attacker to execute arbitrary code on the victim's machine or server through a specific interaction (1-click). This issue has been patched in version 0.0.61.
Severity ?
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-68952",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-29T15:53:19.095871Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-29T15:53:36.804Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "eigent",
"vendor": "eigent-ai",
"versions": [
{
"status": "affected",
"version": "= 0.0.60"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Eigent is a multi-agent Workforce. In version 0.0.60, a 1-click Remote Code Execution (RCE) vulnerability has been identified in Eigent. This vulnerability allows an attacker to execute arbitrary code on the victim\u0027s machine or server through a specific interaction (1-click). This issue has been patched in version 0.0.61."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-27T00:37:08.917Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/eigent-ai/eigent/security/advisories/GHSA-pwcx-28p4-rmq4",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/eigent-ai/eigent/security/advisories/GHSA-pwcx-28p4-rmq4"
}
],
"source": {
"advisory": "GHSA-pwcx-28p4-rmq4",
"discovery": "UNKNOWN"
},
"title": "1-click Remote Code Execution (RCE) vulnerability in Eigent"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-68952",
"datePublished": "2025-12-27T00:37:08.917Z",
"dateReserved": "2025-12-26T16:46:35.335Z",
"dateUpdated": "2025-12-29T15:53:36.804Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}