Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25143: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in chainguard-dev melange

0
High
VulnerabilityCVE-2026-25143cvecve-2026-25143cwe-78
Published: Wed Feb 04 2026 (02/04/2026, 19:32:17 UTC)
Source: CVE Database V5
Vendor/Project: chainguard-dev
Product: melange

Description

CVE-2026-25143 is a high-severity OS command injection vulnerability in chainguard-dev's melange tool versions 0. 10. 0 to before 0. 40. 3. It arises from improper neutralization of special shell characters in the patch pipeline, allowing attackers who can influence patch-related inputs to execute arbitrary shell commands on the build host. Exploitation requires user interaction but no privileges and can lead to full compromise of the build environment. The issue is fixed in version 0. 40. 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:42:29 UTC

Technical Analysis

CVE-2026-25143 is an OS command injection vulnerability classified under CWE-78 affecting the melange tool developed by chainguard-dev. Melange is used to build APK packages via declarative pipelines. Specifically, from versions 0.10.0 up to but not including 0.40.3, the patch pipeline (defined in pkg/build/pipelines/patch.yaml) improperly embeds user-influenced inputs such as series paths, patch filenames, and numeric parameters directly into shell scripts without adequate quoting or validation. This flaw allows shell metacharacters like backticks, command substitutions $(…), semicolons, pipes, or redirections to break out of their intended context and execute arbitrary commands on the build host. The vulnerability can be triggered through melange build and license-check operations when an attacker can control patch-related inputs, for example via pull request-driven CI systems, build-as-a-service platforms, or by manipulating melange configurations. The attacker gains the ability to execute commands with the privileges of the melange build process, which may be significant depending on the environment. The vulnerability requires user interaction (e.g., triggering a build) but no prior authentication or elevated privileges. The issue was publicly disclosed on February 4, 2026, and patched in version 0.40.3. The CVSS v3.1 base score is 7.8, reflecting high severity due to the potential for full confidentiality, integrity, and availability compromise of the build environment. No known exploits in the wild have been reported to date.

Potential Impact

For European organizations, this vulnerability poses a significant risk to software supply chain security, particularly for those using melange in automated build pipelines for APK packages. Successful exploitation could lead to arbitrary code execution on build hosts, enabling attackers to inject malicious code into software artifacts, manipulate licensing checks, or disrupt build processes. This undermines the integrity and trustworthiness of software releases, potentially leading to widespread downstream compromise. Organizations relying on CI/CD systems that integrate melange, especially in sectors with stringent software compliance requirements such as automotive, telecommunications, and finance, face elevated risks. The attack vector through pull request-driven CI or build-as-a-service platforms is particularly concerning given the prevalence of collaborative development workflows in Europe. Additionally, the compromise of build infrastructure could facilitate lateral movement within corporate networks, exposing sensitive intellectual property and customer data.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of melange to version 0.40.3 or later, where the vulnerability has been patched. Organizations should audit their build environments to identify any use of affected melange versions and enforce upgrade policies. Additionally, restrict the sources of patch-related inputs to trusted and authenticated users only, minimizing the risk of malicious input injection. Implement strict input validation and sanitization in any custom pipelines or scripts that interact with melange. Employ least privilege principles for build processes, ensuring melange runs with minimal necessary permissions to limit the impact of potential exploitation. Monitor CI/CD logs and build outputs for anomalous command execution or unexpected behavior. Consider isolating build environments using containerization or sandboxing to contain potential compromises. Finally, educate development and DevOps teams about secure pipeline practices and the risks of command injection vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.820Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983a549f9fa50a62fa8d0ca

Added to database: 2/4/2026, 8:00:09 PM

Last enriched: 2/12/2026, 7:42:29 AM

Last updated: 3/22/2026, 3:43:16 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses