Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8cxw-cc62-q28v | ciguard: discover_pipeline_files follows symlinks out of scan root |
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jo-jo98
Jo-jo98 ciguard |
|
| Vendors & Products |
Jo-jo98
Jo-jo98 ciguard |
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ciguard is a static security auditor for CI/CD pipelines. From 0.8.0 to 0.8.1 , the discover_pipeline_files() function in src/ciguard/discovery.py walks a directory tree following symlinks, with cycle protection via tracking visited resolved paths. An attacker who can plant a symlink in a directory the user (or AI agent) scans can cause discovery to walk into the symlink target and return paths to pipeline-shaped files outside the requested root. This vulnerability is fixed in 0.8.2. | |
| Title | ciguard: discover_pipeline_files follows symlinks out of scan root | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T15:37:35.696Z
Reserved: 2026-05-05T15:42:40.517Z
Link: CVE-2026-44220
Updated: 2026-05-13T14:58:29.496Z
Status : Deferred
Published: 2026-05-12T20:16:42.893
Modified: 2026-05-13T17:02:28.447
Link: CVE-2026-44220
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:36:19Z
Github GHSA