GHSA-8h3q-9fpp-c883

Suggest an improvement
Source
https://github.com/advisories/GHSA-8h3q-9fpp-c883
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-8h3q-9fpp-c883/GHSA-8h3q-9fpp-c883.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8h3q-9fpp-c883
Withdrawn
2026-01-21T23:00:08Z
Published
2026-01-21T00:31:43Z
Modified
2026-02-03T03:05:53.550956Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N CVSS Calculator
Summary
Duplicate Advisory: Wrangler affected by OS Command Injection in `wrangler pages deploy`
Details

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-36p8-mvp6-cv38. This link is maintained to preserve external references.

Original Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the wrangler pages deploy command. The issue occurs because the --commit-hash parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of --commit-hash to execute arbitrary commands on the system running Wrangler.

Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(git show -s --format=%B ${commitHash})). Shell metacharacters are interpreted by the shell, enabling command execution.

ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where wrangler pages deploy is used in automated pipelines and the

--commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to:

  • Run any shell command.
  • Exfiltrate environment variables.
  • Compromise the CI runner to install backdoors or modify build artifacts.

Credits Disclosed responsibly by kny4hacker.

Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Database specific
{
    "github_reviewed_at": "2026-01-21T23:00:08Z",
    "nvd_published_at": "2026-01-20T23:16:06Z",
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-20"
    ],
    "github_reviewed": true
}
References

Affected packages

npm / wrangler

Package

Affected ranges

Type
SEMVER
Events
Introduced
2.0.15

Database specific

last_known_affected_version_range
"< 3.114.17"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-8h3q-9fpp-c883/GHSA-8h3q-9fpp-c883.json"