Impact
A command‑injection flaw exists in the GitHub Actions workflow of the wenxian tool. The workflow incorporates untrusted input from the body of an issue comment directly into a shell command. An attacker able to create or modify an issue comment can inject arbitrary shell commands, leading to remote code execution on the GitHub Actions runner. The weakness falls under CWE‑77 and CWE‑78, allowing attackers to compromise confidentiality and integrity of the runner environment.
Affected Systems
The affected product is wenxian, maintained by njzjz, in all releases version 0.3.1 and earlier. These versions run the vulnerable workflow whenever an issue comment is created or updated in a GitHub repository that contains the workflow. No other products or vendors are listed as affected.
Risk and Exploitability
The base CVSS score is 9.8, indicating a critical severity. The EPSS score is not provided, but given the wide use of GitHub Actions and the lack of a public patch, the likelihood of exploitation is high. The vulnerability is not listed in CISA's KEV catalog. Exploitation requires only the ability to post or edit an issue comment in a repository that hosts the vulnerable workflow, making the attack vector readily available to publicly accessible projects.
OpenCVE Enrichment
Github GHSA