Home

Description

melange allows users to build apk packages using declarative pipelines. From version 0.3.0 to before 0.40.3, an attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipeline uses ${{vars.*}} or ${{inputs.*}} substitutions in working-directory. The field is embedded into shell scripts without proper quote escaping. This issue has been patched in version 0.40.3.

PUBLISHED Reserved 2026-01-27 | Published 2026-02-04 | Updated 2026-02-05 | Assigner GitHub_M




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

>= 0.3.0, < 0.40.3
affected

References

github.com/...elange/security/advisories/GHSA-vqqr-rmpc-hhg2

github.com/...ommit/e51ca30cfb63178f5a86997d23d3fff0359fa6c8

cve.org (CVE-2026-24844)

nvd.nist.gov (CVE-2026-24844)

Download JSON