Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26189: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in aquasecurity trivy-action

0
Medium
VulnerabilityCVE-2026-26189cvecve-2026-26189cwe-78
Published: Thu Feb 19 2026 (02/19/2026, 19:07:49 UTC)
Source: CVE Database V5
Vendor/Project: aquasecurity
Product: trivy-action

Description

Trivy Action runs Trivy as GitHub action to scan a Docker container image for vulnerabilities. A command injection vulnerability exists in `aquasecurity/trivy-action` versions 0.31.0 through 0.33.1 due to improper handling of action inputs when exporting environment variables. The action writes `export VAR=<input>` lines to `trivy_envs.txt` based on user-supplied inputs and subsequently sources this file in `entrypoint.sh`. Because input values are written without appropriate shell escaping, attacker-controlled input containing shell metacharacters (e.g., `$(...)`, backticks, or other command substitution syntax) may be evaluated during the sourcing process. This can result in arbitrary command execution within the GitHub Actions runner context. Version 0.34.0 contains a patch for this issue. The vulnerability is exploitable when a consuming workflow passes attacker-controlled data into any action input that is written to `trivy_envs.txt`. Access to user input is required by the malicious actor. Workflows that do not pass attacker-controlled data into `trivy-action` inputs, workflows that upgrade to a patched version that properly escapes shell values or eliminates the `source ./trivy_envs.txt` pattern, and workflows where user input is not accessible are not affected.

AI-Powered Analysis

AILast updated: 02/19/2026, 22:02:22 UTC

Technical Analysis

The vulnerability CVE-2026-26189 affects aquasecurity's trivy-action, a GitHub Action used to scan Docker container images for vulnerabilities. Versions 0.31.0 through 0.33.1 improperly handle user-supplied inputs when exporting environment variables by writing lines like `export VAR=<input>` to a file named `trivy_envs.txt` without proper shell escaping. This file is then sourced in the action's `entrypoint.sh` script. Because the inputs are not sanitized or escaped, shell metacharacters such as command substitution syntax (`$()`, backticks) can be injected and executed by the shell during sourcing. This leads to OS command injection, allowing arbitrary command execution within the GitHub Actions runner environment. Exploitation requires that an attacker have the ability to supply input to any action input that is written to `trivy_envs.txt`. The vulnerability does not require user interaction but does require privileges to modify workflow inputs. The flaw is fixed in version 0.34.0, which either properly escapes shell values or removes the vulnerable sourcing pattern. No known exploits are reported in the wild as of now. The CVSS 3.1 score is 5.9 (medium), reflecting network attack vector, high privileges required, no user interaction, and high impact on confidentiality and integrity but no impact on availability.

Potential Impact

If exploited, this vulnerability allows an attacker to execute arbitrary commands within the GitHub Actions runner environment. This can lead to unauthorized access to sensitive data, modification of build artifacts, injection of malicious code into software supply chains, and potential lateral movement if the runner has network access to internal resources. Since GitHub Actions runners often have access to source code repositories, secrets, and deployment credentials, the confidentiality and integrity of the software development lifecycle can be severely compromised. Organizations relying on trivy-action in their CI/CD pipelines may face risks of supply chain attacks, data breaches, and disruption of automated security scanning processes. The impact is particularly critical for organizations with complex workflows that incorporate user inputs or third-party data into trivy-action inputs. However, the requirement for attacker-controlled input and the need for high privileges to modify workflows somewhat limit the exploitability scope.

Mitigation Recommendations

The primary mitigation is to upgrade aquasecurity/trivy-action to version 0.34.0 or later, which contains the patch that properly escapes shell inputs or removes the vulnerable sourcing mechanism. Organizations should audit all GitHub workflows using trivy-action to identify if any user-controlled or untrusted inputs are passed to the action inputs that are written to `trivy_envs.txt`. Restrict permissions on who can modify workflows to prevent unauthorized injection of malicious inputs. Avoid passing untrusted data into action inputs that influence environment variables or shell commands. Consider implementing additional runtime protections such as GitHub Actions runner isolation and secrets scanning. Review and harden CI/CD pipeline security policies to minimize exposure to supply chain threats. Monitoring for unusual runner activity and logs can help detect exploitation attempts. Finally, educate developers and DevOps teams about secure usage of GitHub Actions and environment variable handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-11T19:56:24.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699784dbd7880ec89b358477

Added to database: 2/19/2026, 9:47:07 PM

Last enriched: 2/19/2026, 10:02:22 PM

Last updated: 2/20/2026, 10:51:37 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats