GHSA-r79c-pqj3-577x

Suggest an improvement
Source
https://github.com/advisories/GHSA-r79c-pqj3-577x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-r79c-pqj3-577x/GHSA-r79c-pqj3-577x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r79c-pqj3-577x
Aliases
Published
2026-02-09T17:46:31Z
Modified
2026-02-09T18:11:18.187127Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Super-linter is vulnerable to command injection via crafted filenames in Super-linter Action
Details

Summary

The Super-linter GitHub Action is vulnerable to command injection via crafted filenames. When this action is used in downstream GitHub Actions workflows, an attacker can submit a pull request that introduces a file whose name contains shell command substitution syntax, such as $(...). In affected Super-linter versions, runtime scripts may execute the embedded command during file discovery processing, enabling arbitrary command execution in the workflow runner context. This can be used to disclose the job’s GITHUB_TOKEN depending on how the workflow configures permissions.

Details

The issue appears originates in the logic that scans the repository for changed files to check.

  1. Use a workflow that runs Super-linter on pull_request events.
  2. Open a pull request that adds a new file with a crafted filename containing command substitution and an outbound request that includes $GITHUB_TOKEN.
  3. Run the workflow.

Impact

  • Arbitrary command execution in the context of the workflow run that invokes Super-linter (triggered by attacker-controlled filenames in a PR).
  • Credential exposure / misuse: the injected command can read environment variables available to the action, including GITHUB_TOKEN.

The level of exposure depends on the source of the pull request.

To actively exploit the vulnerability, an attacker needs have the ability to run workflows without any approval from the repository admin.

Also, the GITHUB_TOKEN needs to have unconstrained access to repository resources. Even in that case, for pull request coming from forked repositories, no secrets are passed to the forked repository when running workflows triggered by pull_request events, and the GITHUB_TOKEN drops and write permission on the source repository source.

Finally, although not specific to this vulnerability, we recommend auditing workflow_call and pull_request_target workflows because they can lead to compromise, regardless of whether you're using Super-linter, or not, as explained by this GitHub Enterprise doc.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-77"
    ],
    "github_reviewed_at": "2026-02-09T17:46:31Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

GitHub Actions / super-linter/super-linter

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
8.3.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-r79c-pqj3-577x/GHSA-r79c-pqj3-577x.json"

GitHub Actions / super-linter/super-linter/slim

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
8.3.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-r79c-pqj3-577x/GHSA-r79c-pqj3-577x.json"