#VU124869 OS Command Injection in trivy-action - CVE-2026-26189
Published: April 4, 2026
trivy-action
Aqua Security
Description
The vulnerability allows a remote user to execute arbitrary commands.
The vulnerability exists due to improper neutralization of special elements used in an os command in the composite action environment variable export and sourcing logic when processing attacker-controlled action inputs into trivy_envs.txt. A remote privileged user can supply input containing shell metacharacters to execute arbitrary commands.
The issue affects workflows that pass attacker-controlled data into action inputs that are written to trivy_envs.txt and then sourced by entrypoint.sh, resulting in command execution in the GitHub Actions runner context.