- Notifications
You must be signed in to change notification settings - Fork166
Command Injection via sonarqube-scan-action GitHub Action
High
Package
SonarSource/sonarqube-scan-action (GitHub Actions)
Affected versions
>=4, <=5.3.0
Patched versions
5.3.1
Description
Impact
A command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands.
Patches
A fix has been released in SonarQube Scan GitHub Action v5.3.1.
References
Severity
High / 10
CVSS v3 base metrics
Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE ID
CVE-2025-58178
Weaknesses
WeaknessCWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Learn more on MITRE.Credits
Torbjorn-SvenssonReporter