CVE-2025-59844

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59844
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59844.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-59844
Aliases
Published
2025-09-26T16:24:55Z
Modified
2025-11-06T02:50:55.552078Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Argument injection vulnerability in SonarQube Scan Action
Details

SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. A command injection vulnerability exists in SonarQube GitHub Action in version 4.0.0 to before version 6.0.0 when workflows pass user-controlled input to the args parameter on Windows runners without proper validation. This vulnerability bypasses a previous security fix and allows arbitrary command execution, potentially leading to exposure of sensitive environment variables and compromise of the runner environment. The vulnerability has been fixed in version 6.0.0. Users should upgrade to this version or later.

Database specific
{
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

Git / github.com/sonarsource/sonarqube-scan-action

Affected ranges

Type
GIT
Repo
https://github.com/sonarsource/sonarqube-scan-action
Events

Affected versions

v4.*

v4.0
v4.0.0
v4.1
v4.1.0
v4.2.0
v4.2.1

v5.*

v5.0
v5.0.0
v5.1
v5.1.0
v5.2
v5.2.0
v5.3.0
v5.3.1