<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45793 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45793/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 16:18:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45793/feed.xml" rel="self" type="application/rss+xml"/><item><title>GitHub Actions GITHUB_TOKEN Disclosure via Composer Validation Failure</title><link>https://feed.craftedsignal.io/briefs/2026-05-github-token-disclosure/</link><pubDate>Tue, 19 May 2026 16:18:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-github-token-disclosure/</guid><description>Composer leaks GitHub OAuth tokens in GitHub Actions logs if they do not match the expected format due to a validation regex, leading to potential unauthorized access.</description><content:encoded><![CDATA[<p>A vulnerability exists in Composer that leads to the disclosure of GitHub OAuth tokens, including the <code>GITHUB_TOKEN</code> in GitHub Actions logs. This occurs when tokens do not match Composer&rsquo;s expected format, specifically those containing hyphens introduced in GitHub&rsquo;s new token format (<code>ghs_&lt;id&gt;_&lt;base64url-JWT&gt;</code>). Widely-used actions often auto-register the <code>GITHUB_TOKEN</code> into Composer&rsquo;s global <code>auth.json</code>, triggering the leak without specific user configuration. While GitHub Actions tokens expire rapidly (within 6 hours on GitHub-hosted runners and 24 hours on self-hosted runners) and are scoped to the repository, the exposure poses a risk if the token is captured before expiration. This issue is tracked as CVE-2026-45793 and affects Composer versions 2.3.0-2.9.7, 2.0.0-2.2.27 and 1.0-1.10.27.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A GitHub Actions workflow is triggered.</li>
<li>The workflow utilizes an Action (e.g., <code>shivammathur/setup-php</code>) that automatically registers the <code>GITHUB_TOKEN</code> into Composer&rsquo;s global <code>auth.json</code>.</li>
<li>Composer attempts to validate the <code>GITHUB_TOKEN</code> using a regular expression (<code>^[.A-Za-z0-9_]+$</code>) in <code>Composer\IO\BaseIO::loadConfiguration()</code>.</li>
<li>The validation fails because the <code>GITHUB_TOKEN</code> now contains a hyphen (<code>-</code>) due to the new GitHub token format.</li>
<li>Composer throws an <code>UnexpectedValueException</code> containing the full, unmasked <code>GITHUB_TOKEN</code> in the exception message.</li>
<li>Symfony Console, used by Composer, renders the exception message to stderr.</li>
<li>The stderr output, including the plaintext <code>GITHUB_TOKEN</code>, is captured in GitHub Actions logs.</li>
<li>An attacker with access to the logs can then steal the leaked token. The attacker could use the leaked credentials to make unauthorized API calls to Github on behalf of the workflow, with scopes limited to the respective repository.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability results in the exposure of sensitive <code>GITHUB_TOKEN</code> values in GitHub Actions logs, which could allow unauthorized access to repository resources. Though tokens expire quickly and are repository-scoped, successful exploitation could lead to code modification, data exfiltration, or other malicious activities within the compromised repository before the token expires.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect GITHUB_TOKEN Leak in Composer Logs&rdquo; to your SIEM to identify potential token leaks within GitHub Actions logs.</li>
<li>Upgrade to Composer version 2.9.8, 2.2.28 or 1.10.28 or later to address the vulnerability (CVE-2026-45793).</li>
<li>Monitor GitHub Actions logs for unexpected error messages related to Composer token validation failures.</li>
<li>Rotate <code>GITHUB_TOKEN</code> secrets if a leak is suspected to invalidate potentially compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>github</category><category>actions</category><category>composer</category><category>token-leak</category><category>cve-2026-45793</category></item></channel></rss>