Vulnerability Description
Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permissions. The vulnerable workflow uses pull_request_target trigger combined with checkout of untrusted PR code. An attacker can exploit this to steal credentials, post comments, push code, or create releases.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eigent | Eigent | < 0.0.78 |
Related Weaknesses (CWE)
References
- https://github.com/eigent-ai/eigent/commit/bf02500bbbab0f01cd0ed8e6dc21fe5683d6bPatch
- https://github.com/eigent-ai/eigent/pull/836Issue TrackingExploitThird Party Advisory
- https://github.com/eigent-ai/eigent/pull/837Issue TrackingExploitPatch
- https://github.com/eigent-ai/eigent/security/advisories/GHSA-gvh4-93cq-5xxpExploitThird Party Advisory
FAQ
What is CVE-2026-22869?
CVE-2026-22869 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permiss...
How severe is CVE-2026-22869?
CVE-2026-22869 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-22869?
Check the references section above for vendor advisories and patch information. Affected products include: Eigent Eigent.