Back to list

ciguard: discover_pipeline_files follows symlinks out of scan root — CVE-2026-44220

GitHub · GitHub · CVE-2026-44220

ID
CVE-2026-44220
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
low
CVSS
2.4
EPSS
0.00011

Summary

## Summary The `discover_pipeline_files()` function in `src/ciguard/discovery.py` (introduced in v0.8.0 and used by the MCP `scan_repo` tool shipped in v0.8.1) walks a directory tree following symlinks, with cycle protection via tracking visited resolved paths. An attacker who can plant a symlink in a directory the user (or AI agent) scans can cause discovery to walk into the symlink target and return paths to…

Product

pip: ciguard

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories