SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. A command injection vulnerability exists in SonarQube GitHub Action in version 4.0.0 to before version 6.0.0 when workflows pass user-controlled input to the args parameter on Windows runners without proper validation. This vulnerability bypasses a previous security fix and allows arbitrary command execution, potentially leading to exposure of sensitive environment variables and compromise of the runner environment. The vulnerability has been fixed in version 6.0.0. Users should upgrade to this version or later.
History

Mon, 29 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Sonarsource
Sonarsource sonarqube Scanner
Vendors & Products Microsoft
Microsoft windows
Sonarsource
Sonarsource sonarqube Scanner

Fri, 26 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 16:45:00 +0000

Type Values Removed Values Added
Description SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. A command injection vulnerability exists in SonarQube GitHub Action in version 4.0.0 to before version 6.0.0 when workflows pass user-controlled input to the args parameter on Windows runners without proper validation. This vulnerability bypasses a previous security fix and allows arbitrary command execution, potentially leading to exposure of sensitive environment variables and compromise of the runner environment. The vulnerability has been fixed in version 6.0.0. Users should upgrade to this version or later.
Title Argument injection vulnerability in SonarQube Scan Action
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-09-26T16:24:55.126Z

Updated: 2025-09-26T17:31:50.867Z

Reserved: 2025-09-22T14:34:03.472Z

Link: CVE-2025-59844

cve-icon Vulnrichment

Updated: 2025-09-26T17:31:01.848Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-26T17:15:36.853

Modified: 2025-09-29T19:34:10.030

Link: CVE-2025-59844

cve-icon Redhat

No data.