Argument injection vulnerability in SonarQube Scan Action
High severity
GitHub Reviewed
Published
Sep 25, 2025
in
SonarSource/sonarqube-scan-action
•
Updated Sep 29, 2025
Package
Affected versions
>= 4.0.0, < 6.0.0
Patched versions
6.0.0
Description
Published to the GitHub Advisory Database
Sep 26, 2025
Reviewed
Sep 26, 2025
Published by the National Vulnerability Database
Sep 26, 2025
Last updated
Sep 29, 2025
A command injection vulnerability exists in SonarQube GitHub Action prior to v6.0.0 when workflows pass user-controlled input to the args parameter on Windows runners without proper validation. This vulnerability bypasses a previous security fix and allows arbitrary command execution, potentially leading to exposure of sensitive environment variables and compromise of the runner environment.
Patches
The vulnerability has been fixed in version v6.0.0. Users should upgrade to this version or later.
Credits
Francois Lajeunesse-Robert (Boostsecurity.io)
References
References