Логотип exploitDog
bind:CVE-2026-26189
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-26189

Количество 3

Количество 3

nvd логотип

CVE-2026-26189

около 1 месяца назад

Trivy Action runs Trivy as GitHub action to scan a Docker container image for vulnerabilities. A command injection vulnerability exists in `aquasecurity/trivy-action` versions 0.31.0 through 0.33.1 due to improper handling of action inputs when exporting environment variables. The action writes `export VAR=<input>` lines to `trivy_envs.txt` based on user-supplied inputs and subsequently sources this file in `entrypoint.sh`. Because input values are written without appropriate shell escaping, attacker-controlled input containing shell metacharacters (e.g., `$(...)`, backticks, or other command substitution syntax) may be evaluated during the sourcing process. This can result in arbitrary command execution within the GitHub Actions runner context. Version 0.34.0 contains a patch for this issue. The vulnerability is exploitable when a consuming workflow passes attacker-controlled data into any action input that is written to `trivy_envs.txt`. Access to user input is required by the malici

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2026-26189

около 1 месяца назад

Trivy Action runs Trivy as GitHub action to scan a Docker container im ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-9p44-j4g5-cfx5

около 1 месяца назад

Trivy Action has a script injection via sourced env file in composite action

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-26189

Trivy Action runs Trivy as GitHub action to scan a Docker container image for vulnerabilities. A command injection vulnerability exists in `aquasecurity/trivy-action` versions 0.31.0 through 0.33.1 due to improper handling of action inputs when exporting environment variables. The action writes `export VAR=<input>` lines to `trivy_envs.txt` based on user-supplied inputs and subsequently sources this file in `entrypoint.sh`. Because input values are written without appropriate shell escaping, attacker-controlled input containing shell metacharacters (e.g., `$(...)`, backticks, or other command substitution syntax) may be evaluated during the sourcing process. This can result in arbitrary command execution within the GitHub Actions runner context. Version 0.34.0 contains a patch for this issue. The vulnerability is exploitable when a consuming workflow passes attacker-controlled data into any action input that is written to `trivy_envs.txt`. Access to user input is required by the malici

CVSS3: 5.9
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-26189

Trivy Action runs Trivy as GitHub action to scan a Docker container im ...

CVSS3: 5.9
0%
Низкий
около 1 месяца назад
github логотип
GHSA-9p44-j4g5-cfx5

Trivy Action has a script injection via sourced env file in composite action

CVSS3: 5.9
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу