Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26367 | Command Injection via sonarqube-scan-action GitHub Action |
Github GHSA |
GHSA-f79p-9c5r-xg88 | Command Injection via sonarqube-scan-action GitHub Action |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 02 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sonarsource
Sonarsource sonarqube Scanner |
|
| Vendors & Products |
Sonarsource
Sonarsource sonarqube Scanner |
Tue, 02 Sep 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. In versions 4 to 5.3.0, a command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands. A fix has been released in SonarQube Scan GitHub Action 5.3.1. | |
| Title | Command Injection via sonarqube-scan-action GitHub Action | |
| Weaknesses | CWE-77 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-02T16:07:45.743Z
Reserved: 2025-08-27T13:34:56.189Z
Link: CVE-2025-58178
Updated: 2025-09-02T16:06:54.519Z
Status : Awaiting Analysis
Published: 2025-09-02T01:15:30.543
Modified: 2025-09-02T15:55:25.420
Link: CVE-2025-58178
No data.
OpenCVE Enrichment
Updated: 2025-09-02T15:23:06Z
EUVD
Github GHSA