No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26367 | Command Injection via sonarqube-scan-action GitHub Action |
Github GHSA |
GHSA-f79p-9c5r-xg88 | Command Injection via sonarqube-scan-action GitHub Action |
Tue, 02 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sonarsource
Sonarsource sonarqube Scanner |
|
| Vendors & Products |
Sonarsource
Sonarsource sonarqube Scanner |
Tue, 02 Sep 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. In versions 4 to 5.3.0, a command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands. A fix has been released in SonarQube Scan GitHub Action 5.3.1. | |
| Title | Command Injection via sonarqube-scan-action GitHub Action | |
| Weaknesses | CWE-77 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-02T16:07:45.743Z
Reserved: 2025-08-27T13:34:56.189Z
Link: CVE-2025-58178
Updated: 2025-09-02T16:06:54.519Z
Status : Deferred
Published: 2025-09-02T01:15:30.543
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-58178
No data.
OpenCVE Enrichment
Updated: 2025-09-02T15:23:06Z
EUVD
Github GHSA