CVE-2026-39382: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in dbt-labs dbt-core
dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Inside the reusable workflow dbt-labs/actions/blob/main/.github/workflows/open-issue-in-repo.yml, the prep job uses peter-evans/find-comment to search for an existing comment indicating that a docs issue has already been opened. The output steps.issue_comment.outputs.comment-body is then interpolated directly into a bash if statement. Because comment-body is attacker-controlled text and is inserted into shell syntax without escaping, a malicious comment body can break out of the quoted string and inject arbitrary shell commands. This vulnerability is fixed with commit bbed8d28354e9c644c5a7df13946a3a0451f9ab9.
AI Analysis
Technical Summary
The vulnerability in dbt-core involves improper neutralization of special elements used in OS commands (CWE-78). Specifically, the GitHub workflow file open-issue-in-repo.yml uses the output of peter-evans/find-comment to retrieve a comment body that is attacker-controlled. This comment body is interpolated directly into a bash if statement without escaping, enabling command injection. The issue is fixed in commit bbed8d28354e9c644c5a7df13946a3a0451f9ab9.
Potential Impact
An attacker who can control the comment body can execute arbitrary shell commands on the system running the GitHub workflow. This can lead to full compromise of the environment executing the workflow, including unauthorized code execution and potential data exposure or modification.
Mitigation Recommendations
The vulnerability is fixed in commit bbed8d28354e9c644c5a7df13946a3a0451f9ab9. Users should upgrade to this commit or a later version that includes this fix. No other official remediation level or patch link is provided, but applying this commit resolves the issue.
CVE-2026-39382: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in dbt-labs dbt-core
Description
dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Inside the reusable workflow dbt-labs/actions/blob/main/.github/workflows/open-issue-in-repo.yml, the prep job uses peter-evans/find-comment to search for an existing comment indicating that a docs issue has already been opened. The output steps.issue_comment.outputs.comment-body is then interpolated directly into a bash if statement. Because comment-body is attacker-controlled text and is inserted into shell syntax without escaping, a malicious comment body can break out of the quoted string and inject arbitrary shell commands. This vulnerability is fixed with commit bbed8d28354e9c644c5a7df13946a3a0451f9ab9.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability in dbt-core involves improper neutralization of special elements used in OS commands (CWE-78). Specifically, the GitHub workflow file open-issue-in-repo.yml uses the output of peter-evans/find-comment to retrieve a comment body that is attacker-controlled. This comment body is interpolated directly into a bash if statement without escaping, enabling command injection. The issue is fixed in commit bbed8d28354e9c644c5a7df13946a3a0451f9ab9.
Potential Impact
An attacker who can control the comment body can execute arbitrary shell commands on the system running the GitHub workflow. This can lead to full compromise of the environment executing the workflow, including unauthorized code execution and potential data exposure or modification.
Mitigation Recommendations
The vulnerability is fixed in commit bbed8d28354e9c644c5a7df13946a3a0451f9ab9. Users should upgrade to this commit or a later version that includes this fix. No other official remediation level or patch link is provided, but applying this commit resolves the issue.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-06T22:06:40.515Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d5660baaed68159a5b4076
Added to database: 4/7/2026, 8:16:11 PM
Last enriched: 4/7/2026, 8:31:33 PM
Last updated: 4/7/2026, 10:47:19 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.