Description
act is a project which allows for local running of github actions. Prior to version 0.2.86, act unconditionally processes the deprecated ::set-env:: and ::add-path:: workflow commands, which was disabled due to environment injection risks. When a workflow step echoes untrusted data to stdout, an attacker can inject these commands to set arbitrary environment variables or modify the PATH for all subsequent steps in the job. This issue has been patched in version 0.2.86.
Published: 2026-03-31
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted environment variable injection and PATH manipulation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the local workflow runner "act" which unconditionally processes deprecated ::set-env:: and ::add-path:: commands. If a workflow step echoes untrusted data to stdout, those commands can be injected to set arbitrary environment variables or alter the PATH for all subsequent steps. This creates an opportunity for an attacker to influence the execution environment of later steps, potentially enabling execution of malicious code or altering program behavior. The weakness is a classic form of input parsing flaw described by CWE‑74.

Affected Systems

Affected are installations of the nektos act tool prior to version 0.2.86. The advisory states that starting with release 0.2.86 the processing of ::set-env:: and ::add-path:: commands has been removed, mitigating the risk. Any environment running older releases should be considered vulnerable.

Risk and Exploitability

The CVSS score of 7.7 classifies the issue as high severity, reflecting the potential impact of environment manipulation. The EPSS score indicates less than 1% likelihood of exploitation in the wild, and the vulnerability is not currently listed in CISA’s KEV catalog. However, the attack vector requires an attacker to supply or influence untrusted input echoed within a workflow step; therefore, any CI pipeline that accepts untrusted data is at risk. Exploitation would be straightforward for a developer or CI operator with access to the workflow file or its inputs, making the risk moderate to high in such settings.

Generated by OpenCVE AI on April 6, 2026 at 19:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade act to version 0.2.86 or later.

Generated by OpenCVE AI on April 6, 2026 at 19:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xmgr-9pqc-h5vw act: Unrestricted set-env and add-path command processing enables environment injection
History

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nektos:act:*:*:*:*:*:*:*:*

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Nektos
Nektos act
Vendors & Products Nektos
Nektos act

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description act is a project which allows for local running of github actions. Prior to version 0.2.86, act unconditionally processes the deprecated ::set-env:: and ::add-path:: workflow commands, which was disabled due to environment injection risks. When a workflow step echoes untrusted data to stdout, an attacker can inject these commands to set arbitrary environment variables or modify the PATH for all subsequent steps in the job. This issue has been patched in version 0.2.86.
Title act: Unrestricted set-env and add-path command processing enables environment injection
Weaknesses CWE-74
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T14:49:57.581Z

Reserved: 2026-03-25T15:29:04.744Z

Link: CVE-2026-34041

cve-icon Vulnrichment

Updated: 2026-04-02T14:49:34.731Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T03:15:58.053

Modified: 2026-04-06T15:34:15.297

Link: CVE-2026-34041

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:08:13Z

Weaknesses