CVE-2026-25589: GitHub Actions Script Injection via Workflow Inputs

HIGH
8.8HIGH
Published: 2026-01-15Affected: GitHub Actions workflows with untrusted inputsCWE-94

Can GitHub Actions be exploited for code execution?

A script injection vulnerability class affecting GitHub Actions workflows that interpolate untrusted user inputs (PR titles, issue bodies) directly into run steps. Attackers can execute arbitrary code in the CI/CD runner context.

Impact & Exploitation

Affects thousands of open-source and enterprise repositories. Enables secret exfiltration, supply chain tampering, and code signing key theft from CI/CD pipelines.

How Precogs AI Detects GitHub Actions Script Injection via Workflow Inputs

Precogs AI scans GitHub Actions workflow files for injection patterns, detecting unsafe interpolation of user-controlled inputs in run steps and composite actions.

Precogs Logo

Precogs Research

This vulnerability intelligence report was analyzed and enriched by the Precogs AI Security Team. Our researchers continuously monitor emerging threats across AI code, LLM pipelines, and binary architectures to ensure accurate real-time remediation guidance.