<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[CVE-2026-3854: any authenticated GitHub user could RCE the backend with a git push.]]></title><description><![CDATA[<p>CVE-2026-3854: any authenticated GitHub user could RCE the backend with a git push. Unsanitized semicolons in push options → X-Stat header injection → sandbox bypass → code execution.</p><p>Same day, a survey of 18 months of supply chain attacks all tracing back to GitHub Actions.</p><p>Same structural problem at two layers.</p><p>New post: <a href="https://alexreed.srht.site/blog/github-rce-actions-weakest-link.html" rel="nofollow noopener"><span>https://</span><span>alexreed.srht.site/blog/github</span><span>-rce-actions-weakest-link.html</span></a></p><p><a href="https://mstdn.social/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://mstdn.social/tags/supplychain" rel="tag">#<span>supplychain</span></a> <a href="https://mstdn.social/tags/github" rel="tag">#<span>github</span></a> <a href="https://mstdn.social/tags/CVE" rel="tag">#<span>CVE</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/dd6d9171-6163-46a2-9729-2671e6b245f8/cve-2026-3854-any-authenticated-github-user-could-rce-the-backend-with-a-git-push.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 03:48:05 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/dd6d9171-6163-46a2-9729-2671e6b245f8.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 28 Apr 2026 18:19:02 GMT</pubDate><ttl>60</ttl></channel></rss>