Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 29 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eigent
Eigent eigent |
|
| CPEs | cpe:2.3:a:eigent:eigent:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Eigent
Eigent eigent |
|
| Metrics |
cvssV3_1
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eigent-ai
Eigent-ai eigent |
|
| Vendors & Products |
Eigent-ai
Eigent-ai eigent |
Tue, 13 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permissions. The vulnerable workflow uses pull_request_target trigger combined with checkout of untrusted PR code. An attacker can exploit this to steal credentials, post comments, push code, or create releases. | |
| Title | Eigent Allows Arbitrary Code Execution via pull_request_target CI Workflow | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-14T23:26:18.334Z
Reserved: 2026-01-12T16:20:16.747Z
Link: CVE-2026-22869
No data.
Status : Analyzed
Published: 2026-01-13T21:15:54.917
Modified: 2026-01-29T17:52:40.400
Link: CVE-2026-22869
No data.
OpenCVE Enrichment
Updated: 2026-04-18T06:30:25Z