GHSA-36p8-mvp6-cv38

Suggest an improvement
Source
https://github.com/advisories/GHSA-36p8-mvp6-cv38
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-36p8-mvp6-cv38/GHSA-36p8-mvp6-cv38.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-36p8-mvp6-cv38
Aliases
  • CVE-2026-0933
Published
2026-01-21T23:00:35Z
Modified
2026-01-21T23:26:18.872540Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N CVSS Calculator
Summary
Wrangler affected by OS Command Injection in `wrangler pages deploy`
Details

Summary

A command injection vulnerability (CWE-78) has been found to exist in the wrangler pages deploy command. The issue occurs because the --commit-hash parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of --commit-hash to execute arbitrary commands on the system running Wrangler.

Root cause

The commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution.

Impact

This vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where wrangler pages deploy is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to:

  • Run any shell command.
  • Exfiltrate environment variables.
  • Compromise the CI runner to install backdoors or modify build artifacts.

Mitigation

  • Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher.
  • Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher.
  • Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Credits

Disclosed responsibly by kny4hacker.

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-78"
    ],
    "severity": "HIGH",
    "github_reviewed_at": "2026-01-21T23:00:35Z",
    "nvd_published_at": null
}
References

Affected packages

npm / wrangler

Package

Affected ranges

Type
SEMVER
Events
Introduced
2.0.15
Fixed
3.114.17

Database specific

source

"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-36p8-mvp6-cv38/GHSA-36p8-mvp6-cv38.json"

npm / wrangler

Package

Affected ranges

Type
SEMVER
Events
Introduced
4.0.0
Fixed
4.59.1

Database specific

source

"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-36p8-mvp6-cv38/GHSA-36p8-mvp6-cv38.json"