Skip to content

Conversation

@tomghuang
Copy link
Contributor

@tomghuang tomghuang commented Sep 2, 2025

A command injection vulnerability, identified as CVE-2025-58178, was discovered in the SonarQube Scan GitHub Action versions 4 to 5.3.0. This vulnerability allows for potential execution of arbitrary commands due to untrusted input arguments being processed without proper sanitization. These arguments, when passed to the action, were treated as shell expressions, creating an exploitable pathway.

To mitigate this vulnerability, users are strongly advised to upgrade their SonarQube Scan GitHub Action to version 5.3.1 or higher. This patched version addresses the command injection issue by properly sanitizing input arguments. If a workflow uses dynamically computed arguments, it is additionally necessary to switch to using supported syntax for expressions within GitHub Actions. Workflows referencing sonarqube-scan-action@v5 will automatically utilize the patched version, requiring no further action.

The vulnerability is documented in the EUVD (EUVD-2025-26367) and is categorized under the MITRE ATT&CK technique T1202. While the technical details are not publicly available, the exploitability is considered easy, and attacking locally is a requirement. The fix for this vulnerability is also available as patch 016cabf33a6b7edf0733e179a03ad408ad4e88ba.

GHSA-f79p-9c5r-xg88

@tomghuang tomghuang merged commit 851b10b into master Sep 2, 2025
12 checks passed
@tomghuang tomghuang deleted the fix-sonarqube-security-issue branch September 2, 2025 20:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants