Impact
Untrusted content from issue_comment.body is used directly in a shell command in the GitHub Actions workflow of wenxian. The flaw permits an attacker to inject arbitrary shell commands that run on the workflow runner, leading to remote code execution. This vulnerability aligns with CWE‑77 and CWE‑78.
Affected Systems
The affected product is wenxian, a BibTeX generation tool developed by njzjz. Versions 0.3.1 and all earlier releases contain the flaw. The tool is hosted on GitHub and its workflow runs in the context of the repository’s GitHub Actions runners.
Risk and Exploitability
The CVSS score is 9.8, indicating a high severity for remote execution. The EPSS score is below 1%, so the overall probability of exploitation in the wild appears low, yet the public nature of the workflow and the minimal requirement of an issue comment mean an attacker can readily trigger it. The vulnerability is not yet listed in CISA’s KEV catalog. The likely attack vector is any user able to post or modify an issue comment in the repository, which the workflow then processes without validation.
OpenCVE Enrichment
Github GHSA