CVE-2026-31976

Source
https://cve.org/CVERecord?id=CVE-2026-31976
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-31976.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-31976
Aliases
Published
2026-03-11T19:44:38.643Z
Modified
2026-04-02T13:24:09.642712Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
xygeni-action v5 tag poisoned with C2 backdoor
Details

xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into action.yml. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable v5 tag to point at the malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) from one of the unmerged PRs. This commit remained in the repository's git object store, and any workflow referencing @v5 would fetch and execute it. This is a supply chain compromise via tag poisoning. Any GitHub Actions workflow referencing xygeni/xygeni-action@v5 during the affected window (approximately March 3–10, 2026) executed a C2 implant that granted the attacker arbitrary command execution on the CI runner for up to 180 seconds per workflow run.

Database specific
{
    "cwe_ids": [
        "CWE-506"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31976.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/xygeni/xygeni-action

Affected ranges

Type
GIT
Repo
https://github.com/xygeni/xygeni-action
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.38.0"
        },
        {
            "last_affected": "6.4.0"
        }
    ]
}

Affected versions

Other
v5
v6
v5.*
v5.38.0
v5.38.1
v6.*
v6.4.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-31976.json"