<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Act — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/act/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 31 Mar 2026 03:15:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/act/feed.xml" rel="self" type="application/rss+xml"/><item><title>act Project Cache Poisoning Vulnerability Leads to Potential RCE</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-act-cache-rce/</link><pubDate>Tue, 31 Mar 2026 03:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-act-cache-rce/</guid><description>A vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.</description><content:encoded><![CDATA[<p>The <code>act</code> project, designed for local execution of GitHub Actions workflows, contains a critical vulnerability affecting versions prior to 0.2.86. The built-in actions/cache server, intended for local caching, inadvertently listens for connections on all network interfaces. This exposure allows any attacker capable of reaching the server, including those on the internet, to create caches with arbitrary keys and retrieve existing cache data. By predicting the cache keys used by local actions, an attacker can inject malicious content into the cache, paving the way for arbitrary remote code execution within the Docker container used by <code>act</code>. This vulnerability was addressed in version 0.2.86 of <code>act</code>. The CVSS v3.1 base score is 8.2, indicating a high severity threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable <code>act</code> instance running a version prior to 0.2.86 with its cache server exposed on all interfaces.</li>
<li>The attacker probes the exposed <code>act</code> cache server to determine accessible endpoints and version information.</li>
<li>The attacker analyzes common GitHub Actions workflows and identifies predictable cache keys.</li>
<li>The attacker crafts a malicious cache archive containing payloads designed for remote code execution.</li>
<li>The attacker uploads the malicious cache archive to the vulnerable <code>act</code> instance using the predicted cache key.</li>
<li>A legitimate user triggers a local GitHub Actions workflow using <code>act</code>.</li>
<li>The <code>act</code> instance retrieves the attacker&rsquo;s malicious cache archive instead of the expected legitimate cache.</li>
<li>The malicious payload within the cache is executed within the Docker container, leading to remote code execution on the host system running <code>act</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to achieve arbitrary remote code execution on the host system running the vulnerable version of <code>act</code>. This can lead to complete system compromise, data theft, and further lateral movement within the network. The vulnerability affects any user running a version of <code>act</code> prior to 0.2.86 with the cache server exposed. While the number of directly affected users is unknown, the potential impact on development environments and CI/CD pipelines is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to version 0.2.86 or later of the <code>act</code> project to remediate the vulnerability (CVE-2026-34042).</li>
<li>Implement network access controls to restrict access to the <code>act</code> cache server to only trusted networks and hosts.</li>
<li>Monitor network connections to the <code>act</code> cache server for unexpected or unauthorized access.</li>
<li>Enable process monitoring on systems running <code>act</code> to detect potentially malicious processes spawned from Docker containers.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>act</category><category>cache-poisoning</category><category>rce</category><category>github-actions</category><category>linux</category></item></channel></rss>