Description
xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into action.yml. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable v5 tag to point at the malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) from one of the unmerged PRs. This commit remained in the repository's git object store, and any workflow referencing @v5 would fetch and execute it. This is a supply chain compromise via tag poisoning. Any GitHub Actions workflow referencing xygeni/xygeni-action@v5 during the affected window (approximately March 3–10, 2026) executed a C2 implant that granted the attacker arbitrary command execution on the CI runner for up to 180 seconds per workflow run.
Published: 2026-03-11
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution on CI Runner
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a supply‑chain compromise caused by an attacker who injected obfuscated shell code into the action.yml of the xygeni/xygeni‑action GitHub Action. By moving the mutable @v5 tag to point at the malicious commit, any workflow that references xygeni/xygeni-action@v5 during the affected window (March 3–10, 2026) will fetch and execute that code. The injected payload is a command‑and‑control implant that grants the attacker arbitrary command execution on the GitHub Actions CI runner for up to 180 seconds on each workflow run. This is an instance of CWE‑506 (Exposed Secret in Source Code) and results in full Remote Code Execution on the build environment.

Affected Systems

The affected product is the xygeni-action GitHub Action for the Xygeni Scanner, indicated by the vendor product pair xygeni:xygeni-action. The specific vulnerability impacts the mutable @v5 tag; any workflow that uses xygeni/xygeni-action@v5 during the specified window is at risk. No other versions or tags are listed in the vulnerable commit, so the risk applies exclusively to references that resolve to the malicious v5 tag during that time.

Risk and Exploitability

The CVSS score of 9.3 indicates a high‑severity flaw, and the EPSS score of less than 1% suggests limited public exploitation data so far. The vulnerability is not in the CISA KEV catalog. The attack vector is remote, via a compromised GitHub App credential that allowed the attacker to alter tag references. Once a workflow references the poisoned tag, the malicious code executes with the same permissions as the workflow runner, enabling arbitrary command execution. Organizations that use the default @v5 reference during the affected period faced a significant risk of compromise.

Generated by OpenCVE AI on March 17, 2026 at 15:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Switch the action reference from the mutable tag '@v5' to a fixed commit SHA or a stable release tag after verifying its integrity
  • Check the repository and vendor advisories for a patched release removing the injected code, and update the workflow accordingly
  • Review and tighten GitHub App permissions and tag protection rules to prevent unauthorized tag changes, and monitor CI runners for anomalous activity

Generated by OpenCVE AI on March 17, 2026 at 15:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-f8q5-h5qh-33mh xygeni-action v5 tag poisoned with C2 backdoor
History

Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:xygeni:xygeni-action:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Xygeni
Xygeni xygeni-action
Vendors & Products Xygeni
Xygeni xygeni-action

Wed, 11 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into action.yml. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable v5 tag to point at the malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) from one of the unmerged PRs. This commit remained in the repository's git object store, and any workflow referencing @v5 would fetch and execute it. This is a supply chain compromise via tag poisoning. Any GitHub Actions workflow referencing xygeni/xygeni-action@v5 during the affected window (approximately March 3–10, 2026) executed a C2 implant that granted the attacker arbitrary command execution on the CI runner for up to 180 seconds per workflow run.
Title xygeni-action v5 tag poisoned with C2 backdoor
Weaknesses CWE-506
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Xygeni Xygeni-action
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T19:54:54.608Z

Reserved: 2026-03-10T15:40:10.487Z

Link: CVE-2026-31976

cve-icon Vulnrichment

Updated: 2026-03-12T19:54:51.816Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T20:16:17.440

Modified: 2026-03-16T19:02:12.933

Link: CVE-2026-31976

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:55:14Z

Weaknesses