Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Prior to 2.14.2, a security vulnerability has been identified in the Harden-Runner GitHub Action (Community Tier) that allows outbound network connections to evade audit logging. Specifically, outbound traffic using the sendto, sendmsg, and sendmmsg socket system calls can bypass detection and logging when using egress-policy: audit. This vulnerability is fixed in 2.14.2.
References
| Link | Resource |
|---|---|
| https://github.com/step-security/harden-runner/releases/tag/v2.14.2 | Release Notes |
| https://github.com/step-security/harden-runner/security/advisories/GHSA-cpmj-h4f6-r6pq | Vendor Advisory |
Configurations
History
28 Feb 2026, 00:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/step-security/harden-runner/releases/tag/v2.14.2 - Release Notes | |
| References | () https://github.com/step-security/harden-runner/security/advisories/GHSA-cpmj-h4f6-r6pq - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| Summary |
|
|
| CPE | cpe:2.3:a:stepsecurity:harden-runner:*:*:*:*:community:*:*:* | |
| First Time |
Stepsecurity harden-runner
Stepsecurity |
09 Feb 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 20:15
Updated : 2026-02-28 00:23
NVD link : CVE-2026-25598
Mitre link : CVE-2026-25598
CVE.ORG link : CVE-2026-25598
JSON object : View
Products Affected
stepsecurity
- harden-runner
CWE
CWE-778
Insufficient Logging
