Home

Description

SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. A command injection vulnerability exists in SonarQube GitHub Action in version 4.0.0 to before version 6.0.0 when workflows pass user-controlled input to the args parameter on Windows runners without proper validation. This vulnerability bypasses a previous security fix and allows arbitrary command execution, potentially leading to exposure of sensitive environment variables and compromise of the runner environment. The vulnerability has been fixed in version 6.0.0. Users should upgrade to this version or later.

PUBLISHED Reserved 2025-09-22 | Published 2025-09-26 | Updated 2025-09-26 | Assigner GitHub_M




HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

>= 4.0.0, < 6.0.0
affected

References

github.com/...action/security/advisories/GHSA-5xq9-5g24-4g6f

community.sonarsource.com/...scanner-github-action-v6/149281

github.com/...urce/sonarqube-scan-action/releases/tag/v6.0.0

cve.org (CVE-2025-59844)

nvd.nist.gov (CVE-2025-59844)

Download JSON