Impact
Hardening agent Harden-Runner fails to enforce the egress-policy: block restriction by permitting DNS queries over TCP. An attacker who has achieved code execution within a GitHub Actions workflow can use these queries to reach endpoints that are not on the allowed‑endpoints list.
Affected Systems
Step Security's Harden-Runner Community Tier is affected in all releases up to and including 2.15.1. The vulnerability was addressed in version 2.16.0, which can be downloaded from the project’s releases.
Risk and Exploitability
The CVSS base score is 4.6, indicating moderate severity, and the EPSS score is less than 1%, suggesting a low likelihood of exploitation. Because the vulnerability requires pre‑existing code execution in the workflow, the primary risk is to insiders or compromised contributors. The vulnerability is not listed in CISA’s KEV catalog.
OpenCVE Enrichment
Github GHSA