| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cpmj-h4f6-r6pq | Harden-Runner: Bypassing Logging of Outbound Connections Using sendto, sendmsg, and sendmmsg in Harden-Runner (Community Tier) |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 10 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Step Security
Step Security harden Runner |
|
| Vendors & Products |
Step Security
Step Security harden Runner |
Mon, 09 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Prior to 2.14.2, a security vulnerability has been identified in the Harden-Runner GitHub Action (Community Tier) that allows outbound network connections to evade audit logging. Specifically, outbound traffic using the sendto, sendmsg, and sendmmsg socket system calls can bypass detection and logging when using egress-policy: audit. This vulnerability is fixed in 2.14.2. | |
| Title | Bypassing Logging of Outbound Connections Using sendto, sendmsg, and sendmmsg in Harden-Runner (Community Tier) | |
| Weaknesses | CWE-778 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-10T16:00:59.966Z
Reserved: 2026-02-03T01:02:46.717Z
Link: CVE-2026-25598
Updated: 2026-02-10T15:30:24.585Z
Status : Awaiting Analysis
Published: 2026-02-09T20:15:58.653
Modified: 2026-02-09T21:55:30.093
Link: CVE-2026-25598
OpenCVE Enrichment
Updated: 2026-02-10T16:26:52Z
Github GHSA