CVE-2025-58178

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58178
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58178.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58178
Aliases
Published
2025-09-02T00:51:24.579Z
Modified
2025-11-28T02:34:43.784347Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Command Injection via sonarqube-scan-action GitHub Action
Details

SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. In versions 4 to 5.3.0, a command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands. A fix has been released in SonarQube Scan GitHub Action 5.3.1.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58178.json",
    "cwe_ids": [
        "CWE-77"
    ]
}
References

Affected packages

Git / github.com/sonarsource/sonarqube-scan-action

Affected ranges

Type
GIT
Repo
https://github.com/sonarsource/sonarqube-scan-action
Events