CVE-2026-44220 PUBLISHED

ciguard: discover_pipeline_files follows symlinks out of scan root

Assigner: GitHub_M
Reserved: 05.05.2026 Published: 12.05.2026 Updated: 12.05.2026

ciguard is a static security auditor for CI/CD pipelines. From 0.8.0 to 0.8.1 , the discover_pipeline_files() function in src/ciguard/discovery.py walks a directory tree following symlinks, with cycle protection via tracking visited resolved paths. An attacker who can plant a symlink in a directory the user (or AI agent) scans can cause discovery to walk into the symlink target and return paths to pipeline-shaped files outside the requested root. This vulnerability is fixed in 0.8.2.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
CVSS Score: 3.2

Product Status

Vendor Jo-Jo98
Product ciguard
Versions
  • Version >= 0.8.0, < 0.8.2 is affected

References

Problem Types

  • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE