CVE-2025-58178

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58178
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-58178.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-58178
Aliases
Withdrawn
2025-09-03T15:57:49.516014Z
Published
2025-09-02T01:15:30Z
Modified
2025-09-03T12:54:45.125316Z
Summary
[none]
Details

SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. In versions 4 to 5.3.0, a command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands. A fix has been released in SonarQube Scan GitHub Action 5.3.1.

References

Affected packages

Git / github.com/sonarsource/sonarqube-scan-action

Affected ranges

Type
GIT
Repo
https://github.com/sonarsource/sonarqube-scan-action
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

v1
v2
v3
v4

v1.*

v1.0.0
v1.1.0
v1.2
v1.2.0

v2.*

v2.0
v2.0.0
v2.0.1
v2.0.2
v2.1
v2.1.0
v2.2
v2.2.0
v2.3
v2.3.0

v3.*

v3.0
v3.0.0
v3.1
v3.1.0

v4.*

v4.0
v4.0.0
v4.1
v4.1.0
v4.2
v4.2.0
v4.2.1

v5.*

v5.0
v5.0.0
v5.1
v5.1.0
v5.2
v5.2.0
v5.3.0