Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33634: CWE-506: Embedded Malicious Code in aquasecurity setup-trivy

0
Critical
VulnerabilityCVE-2026-33634cvecve-2026-33634cwe-506
Published: Mon Mar 23 2026 (03/23/2026, 21:47:29 UTC)
Source: CVE Database V5
Vendor/Project: aquasecurity
Product: setup-trivy

Description

CVE-2026-33634 is a critical supply chain vulnerability affecting the aquasecurity Trivy security scanner and its associated GitHub Actions. An attacker used compromised credentials to publish a malicious Trivy v0. 69. 4 release and force-push malicious commits to nearly all version tags of aquasecurity/trivy-action and aquasecurity/setup-trivy repositories. This allowed credential-stealing malware to be distributed via these widely used components. The attack exploited incomplete credential rotation, enabling persistent access. Organizations using affected versions risk secret exfiltration and must immediately rotate all secrets, remove compromised artifacts, and audit workflows for signs of compromise. Mitigations include pinning GitHub Actions to immutable commit SHAs rather than mutable tags and verifying workflow logs for suspicious activity. Known safe versions are available and should be adopted promptly.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 22:15:54 UTC

Technical Analysis

CVE-2026-33634 represents a severe supply chain attack targeting the aquasecurity Trivy ecosystem, specifically the Trivy binary version 0.69.4, the trivy-action GitHub Action versions 0.0.1 through 0.34.2, and the setup-trivy GitHub Action versions prior to 0.2.6. On March 19, 2026, threat actors leveraged compromised credentials to publish a malicious Trivy release and force-push malicious commits to nearly all version tags of the affected GitHub Actions repositories. This attack is a continuation of an earlier compromise starting in late February 2026, where credential rotation was performed but not atomically, allowing attackers to retain access by exfiltrating newly rotated secrets during the rotation window. The malicious commits embedded credential-stealing malware, enabling attackers to harvest secrets from CI/CD pipelines that used these components. The attack exploited the common practice of referencing mutable version tags in GitHub workflows, which allowed the attacker to replace legitimate code with malicious versions without immediate detection. The presence of a suspicious repository named 'tpcp-docs' may indicate successful exfiltration of secrets. The vulnerability is classified under CWE-506 (Embedded Malicious Code) and has a CVSS 4.0 score of 9.4, reflecting its critical severity with network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. The incident underscores the risks inherent in supply chain dependencies and the importance of secure credential management and immutable references in CI/CD pipelines.

Potential Impact

The impact of CVE-2026-33634 is substantial for organizations worldwide that rely on Trivy and its GitHub Actions for container and infrastructure security scanning. The malicious versions distributed credential-stealing malware, potentially exposing sensitive secrets such as API keys, tokens, and credentials used in CI/CD pipelines. This exposure can lead to unauthorized access to critical infrastructure, data breaches, lateral movement within networks, and further compromise of organizational assets. The attack compromises the integrity and trustworthiness of the security tooling itself, undermining confidence in supply chain components. Organizations that pulled or executed the compromised versions risk persistent backdoors and secret leakage, which can facilitate espionage, ransomware deployment, or data exfiltration. The widespread use of Trivy in DevOps environments amplifies the scope of affected systems. Additionally, the attack demonstrates how incomplete credential rotation can prolong attacker access, increasing the window for exploitation. The potential presence of fallback exfiltration repositories indicates advanced attacker persistence and data theft capabilities.

Mitigation Recommendations

To mitigate this threat, organizations must immediately audit their environments for usage of affected Trivy versions (v0.69.4) and GitHub Actions (trivy-action versions 0.0.1–0.34.2 and setup-trivy versions <0.2.6). Remove all compromised artifacts and replace them with known safe versions: Trivy binaries 0.69.2 or 0.69.3, trivy-action 0.35.0, and setup-trivy 0.2.6 with safe commits. Rotate all secrets accessible to affected pipelines without delay, assuming potential exposure. Review GitHub workflow run logs from March 19–20, 2026, for signs of compromise, including unexpected repository creations such as 'tpcp-docs'. Enforce the use of immutable commit SHA references in GitHub Actions workflows instead of mutable version tags to prevent silent code replacement. Implement atomic credential rotation procedures to avoid windows of vulnerability. Enhance monitoring for anomalous repository activity and secret access patterns. Consider adopting additional supply chain security measures such as signing and verifying action code, and integrating tools that detect malicious commits or unusual force-push events. Educate development and DevOps teams on the risks of mutable references and credential hygiene.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T14:24:11.619Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1b815f4197a8e3b932274

Added to database: 3/23/2026, 10:00:53 PM

Last enriched: 3/23/2026, 10:15:54 PM

Last updated: 3/23/2026, 11:10:25 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses