Impact
The Eigent multi‑agent platform contains a flaw in its CI workflow configuration that triggers on pull_request_target events and checks out code from the pull request. Because the workflow runs with repository permissions, an attacker can inject malicious steps, resulting in arbitrary code execution. This CVE is a classic input‑validation and injection issue, categorized as CWE‑94. An attacker can read secrets, create new releases, push code, and post comments.
Affected Systems
Eigent, the workforce automation tool owned by eigent-ai. The vulnerability exists in any release that contains the unpatched ci.yml workflow file; the specific affected versions are not listed.
Risk and Exploitability
The vulnerability has a CVSS score of 8.9, indicating high severity. The EPSS score is below 1%, suggesting low probability of exploitation currently, and the issue is not listed in the CISA KEV catalog. Exploitation requires the workflow to run with pull_request_target on a repository that allows forked pull requests with write permissions. Once triggered, the attacker can run any code with the workflow’s permissions, including accessing secrets and pushing changes.
OpenCVE Enrichment