Untriaged
Permalink
CVE-2026-35580
9.1 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Emissary has GitHub Actions Shell Injection via Workflow Inputs
Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, GitHub Actions workflow files contained shell injection points where user-controlled workflow_dispatch inputs were interpolated directly into shell commands via ${{ }} expression syntax. An attacker with repository write access could inject arbitrary shell commands, leading to repository poisoning and supply chain compromise affecting all downstream users. This vulnerability is fixed in 8.39.0.
References
-
https://github.com/NationalSecurityAgency/emissary/pull/1286 x_refsource_MISC
-
https://github.com/NationalSecurityAgency/emissary/pull/1288 x_refsource_MISC
Affected products
emissary
- ==< 8.39.0
Package maintainers
-
@N4CH723HR3R N4CH723HR3R <n4ch7@n3831.net>