๐Ÿ” CVE Alert

CVE-2026-31976

UNKNOWN 0.0

xygeni-action v5 tag poisoned with C2 backdoor

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into action.yml. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable v5 tag to point at the malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) from one of the unmerged PRs. This commit remained in the repository's git object store, and any workflow referencing @v5 would fetch and execute it. This is a supply chain compromise via tag poisoning. Any GitHub Actions workflow referencing xygeni/xygeni-action@v5 during the affected window (approximately March 3โ€“10, 2026) executed a C2 implant that granted the attacker arbitrary command execution on the CI runner for up to 180 seconds per workflow run.

CWE CWE-506
Vendor xygeni
Product xygeni-action
Published Mar 11, 2026
Last Updated Mar 12, 2026
Stay Ahead of the Next One

Get instant alerts for xygeni xygeni-action

Be the first to know when new unknown vulnerabilities affecting xygeni xygeni-action are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

xygeni / xygeni-action
>= March 3, 2026, <= March 10, 2026

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/xygeni/xygeni-action/security/advisories/GHSA-f8q5-h5qh-33mh github.com: https://github.com/xygeni/xygeni-action/issues/54