Impact
User‑controlled workflow_dispatch inputs are directly interpolated into shell commands within GitHub Actions workflow files, creating a shell injection point. An attacker capable of writing to the repository can inject arbitrary shell commands, leading to repository poisoning and a supply chain compromise that affects all downstream users. The weakness is a classic command injection attack and is listed as CWE‑77.
Affected Systems
Emissary, a peer‑to‑peer data‑driven workflow engine, is affected on all releases prior to version 8.39.0. The vulnerability is present in the GitHub Actions workflow files that use the legacy shell command interpolation syntax.
Risk and Exploitability
The CVSS score of 9.1 indicates a critical severity. Although the EPSS score is not available, the vulnerability is not catalogued in the CISA KEV list. The likely attack vector requires repository write access, meaning developers or contributors who can push to the repository can trigger the injection. The impact is wide‑ranging, potentially enabling arbitrary code execution and compromising the integrity of the repository and downstream software that relies on it.
OpenCVE Enrichment
Github GHSA