An attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipeline uses ${{vars.*}} or ${{inputs.*}} substitutions in working-directory. The field is embedded into shell scripts without proper quote escaping.
Fix: Fixed with e51ca30c, Released.
Acknowledgements
melange thanks Oleh Konko from 1seal for discovering and reporting this issue.
{
"nvd_published_at": "2026-02-04T20:16:05Z",
"cwe_ids": [
"CWE-78"
],
"github_reviewed_at": "2026-02-03T23:48:25Z",
"severity": "HIGH",
"github_reviewed": true
}