Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-25598

Опубликовано: 09 фев. 2026
Источник: redhat
CVSS3: 4.3

Описание

Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Prior to 2.14.2, a security vulnerability has been identified in the Harden-Runner GitHub Action (Community Tier) that allows outbound network connections to evade audit logging. Specifically, outbound traffic using the sendto, sendmsg, and sendmmsg socket system calls can bypass detection and logging when using egress-policy: audit. This vulnerability is fixed in 2.14.2.

A flaw was found in Harden-Runner, a CI/CD security agent. This vulnerability allows outbound network connections to evade audit logging. A remote attacker could exploit this by using specific socket system calls (sendto, sendmsg, and sendmmsg) to bypass detection and logging when the egress-policy: audit is enabled. This could lead to unauthorized information disclosure or a bypass of security monitoring.

Отчет

This vulnerability is rated as Moderate, in part due to the following necessary preconditions for exploitation to be possible:

  1. Harden-runner must be in audit mode.
  2. The attacker must already have code execution capabilities within the GitHub Actions workflow. Note: When using egress-policy: block, these connections are properly blocked.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/bitwarden-sdk-server-rhel9Fix deferred
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/external-secrets-operator-bundleFix deferred
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/external-secrets-operator-rhel9Fix deferred
External Secrets Operator for Red Hat OpenShiftexternal-secrets-operator/external-secrets-rhel9Fix deferred
Gatekeeper 3gatekeeper/gatekeeper-rhel9Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/addon-manager-rhel9Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/placement-rhel9Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/registration-operator-rhel9Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/registration-rhel9Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/work-rhel9Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-778
https://bugzilla.redhat.com/show_bug.cgi?id=2438198harden-runner: Harden-Runner: Outbound network connections can evade audit logging via specific socket system calls.

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
около 2 месяцев назад

Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Prior to 2.14.2, a security vulnerability has been identified in the Harden-Runner GitHub Action (Community Tier) that allows outbound network connections to evade audit logging. Specifically, outbound traffic using the sendto, sendmsg, and sendmmsg socket system calls can bypass detection and logging when using egress-policy: audit. This vulnerability is fixed in 2.14.2.

github
около 2 месяцев назад

Harden-Runner: Bypassing Logging of Outbound Connections Using sendto, sendmsg, and sendmmsg in Harden-Runner (Community Tier)

4.3 Medium

CVSS3