The Super-linter GitHub Action is vulnerable to command injection via crafted filenames. When this action is used in downstream GitHub Actions workflows, an attacker can submit a pull request that introduces a file whose name contains shell command substitution syntax, such as $(...). In affected Super-linter versions, runtime scripts may execute the embedded command during file discovery processing, enabling arbitrary command execution in the workflow runner context. This can be used to disclose the job’s GITHUB_TOKEN depending on how the workflow configures permissions.
The issue appears originates in the logic that scans the repository for changed files to check.
pull_request events.$GITHUB_TOKEN.GITHUB_TOKEN.The level of exposure depends on the source of the pull request.
To actively exploit the vulnerability, an attacker needs have the ability to run workflows without any approval from the repository admin.
Also, the GITHUB_TOKEN needs to have unconstrained access to repository resources. Even in that case, for pull request coming from forked repositories, no secrets are passed to the forked repository when running workflows triggered by pull_request events, and the GITHUB_TOKEN drops and write permission on the source repository source.
Finally, although not specific to this vulnerability, we recommend auditing workflow_call and pull_request_target workflows because they can lead to compromise, regardless of whether you're using Super-linter, or not, as explained by this GitHub Enterprise doc.
{
"nvd_published_at": null,
"cwe_ids": [
"CWE-77"
],
"github_reviewed_at": "2026-02-09T17:46:31Z",
"severity": "HIGH",
"github_reviewed": true
}