Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-26189

Опубликовано: 19 фев. 2026
Источник: nvd
CVSS3: 5.9
CVSS3: 8.1
EPSS Низкий

Описание

Trivy Action runs Trivy as GitHub action to scan a Docker container image for vulnerabilities. A command injection vulnerability exists in aquasecurity/trivy-action versions 0.31.0 through 0.33.1 due to improper handling of action inputs when exporting environment variables. The action writes export VAR=<input> lines to trivy_envs.txt based on user-supplied inputs and subsequently sources this file in entrypoint.sh. Because input values are written without appropriate shell escaping, attacker-controlled input containing shell metacharacters (e.g., $(...), backticks, or other command substitution syntax) may be evaluated during the sourcing process. This can result in arbitrary command execution within the GitHub Actions runner context. Version 0.34.0 contains a patch for this issue. The vulnerability is exploitable when a consuming workflow passes attacker-controlled data into any action input that is written to trivy_envs.txt. Access to user input is required by the malici

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:aquasec:trivy_action:*:*:*:*:*:*:*:*
Версия от 0.31.0 (включая) до 0.34.1 (исключая)

EPSS

Процентиль: 28%
0.00101
Низкий

5.9 Medium

CVSS3

8.1 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 5.9
debian
около 1 месяца назад

Trivy Action runs Trivy as GitHub action to scan a Docker container im ...

CVSS3: 5.9
github
около 1 месяца назад

Trivy Action has a script injection via sourced env file in composite action

EPSS

Процентиль: 28%
0.00101
Низкий

5.9 Medium

CVSS3

8.1 High

CVSS3

Дефекты

CWE-78