logo

CVE-2025-58178 sonarsource/sonarqube-scan-action

Package

Manager: github_actions
Name: sonarsource/sonarqube-scan-action
Vulnerable Version: >=4.0.0 <5.3.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00045 pctl0.13059

Details

Command Injection via sonarqube-scan-action GitHub Action ### Impact A command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands. ### Patches A fix has been released in SonarQube Scan GitHub Action v5.3.1.

Metadata

Created: 2025-09-02T17:31:57Z
Modified: 2025-09-02T17:31:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-f79p-9c5r-xg88/GHSA-f79p-9c5r-xg88.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-f79p-9c5r-xg88
Finding: F422
Auto approve: 1