CVE-2025-58178 – sonarsource/sonarqube-scan-action
Package
Manager: github_actions
Name: sonarsource/sonarqube-scan-action
Vulnerable Version: >=4.0.0 <5.3.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00045 pctl0.13059
Details
Command Injection via sonarqube-scan-action GitHub Action ### Impact A command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands. ### Patches A fix has been released in SonarQube Scan GitHub Action v5.3.1.
Metadata
Created: 2025-09-02T17:31:57Z
Modified: 2025-09-02T17:31:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-f79p-9c5r-xg88/GHSA-f79p-9c5r-xg88.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-f79p-9c5r-xg88
Finding: F422
Auto approve: 1