{"id":"CVE-2026-32946","summary":"Egress Policy Bypass via DNS over TCP in Harden-Runner (Community Tier)","details":"Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. In versions 2.15.1 and below, the Harden-Runner that allows bypass of the egress-policy: block network restriction using DNS queries over TCP. Egress policies are enforced on GitHub runners by filtering outbound connections at the network layer. When egress-policy: block is enabled with a restrictive allowed-endpoints list (e.g., only github.com:443), all non-compliant traffic should be denied. However, DNS queries over TCP, commonly used for large responses or fallback from UDP, are not adequately restricted. Tools like dig can explicitly initiate TCP-based DNS queries (+tcp flag) without being blocked. This vulnerability requires the attacker to already have code execution capabilities within the GitHub Actions workflow. The issue has been fixed in version 2.16.0.","aliases":["GHSA-g699-3x6g-wm3g"],"modified":"2026-04-10T05:42:32.264672Z","published":"2026-03-20T03:58:40.557Z","database_specific":{"cwe_ids":["CWE-693","CWE-863"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32946.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/step-security/harden-runner/releases/tag/v2.16.0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32946.json"},{"type":"ADVISORY","url":"https://github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32946"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/step-security/harden-runner","events":[{"introduced":"0"},{"fixed":"fa2e9d605c4eeb9fcad4c99c224cee0c6c7f3594"}]}],"versions":["v0.1.0","v0.1.1","v0.2.0","v0.3.0","v0.4.0","v1","v1.3.0","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.5.0","v2","v2.0.0","v2.1.0","v2.10.0","v2.10.1","v2.10.2","v2.10.3","v2.10.4","v2.11.0","v2.11.1","v2.12.0","v2.12.1","v2.12.2","v2.13.0","v2.13.1","v2.13.2","v2.13.3","v2.14.0","v2.14.1","v2.14.2","v2.15.0","v2.15.1","v2.2.0","v2.2.1","v2.3.0","v2.3.1","v2.4.0","v2.4.1","v2.5.0","v2.5.1","v2.6.0","v2.6.1","v2.7.0","v2.7.1","v2.8.0","v2.8.1","v2.9.0","v2.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-32946.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N"}]}