[GHSA-r79c-pqj3-577x] Super-linter is vulnerable to command injection via crafted filenames in Super-linter Action#6910
Conversation
|
Hi there @ferrarimarco! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository. This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory |
|
A file containing the complete analysis and solution to the vulnerability has been added to the Zayed Shield repository. You can refer to it directly if you need technical details or remediation steps. My goal is to share knowledge and support the security community. I wish I could offer more, but these are my current capabilities. Nevertheless, I am working hard to demonstrate a level of professionalism that we all deserve. The full analysis and solution to the vulnerability have been added to the Zayed Shield repository. |
Updates
Comments
GitHub Super-linter Command Injection Vulnerability Analysis
CVE-2026-25761 - Professional Security Assessment
Executive Summary
Vulnerability Identifier: CVE-2026-25761
Severity Rating: HIGH
Affected Component: Super-linter/super-linter GitHub Action
Discovery Date: Last Week
Status: PATCHED
Discovered By:
Security Researcher: Asrar Mared (The Warrior Bug Hunter)
Contact: nike49424@proton.me
GitHub: @asrar-mared
Vulnerability Overview
The Super-linter GitHub Action contains a critical command injection vulnerability that allows malicious actors to execute arbitrary commands through specially crafted filenames. This vulnerability represents a significant security risk to organizations utilizing Super-linter in their CI/CD pipelines.
Technical Classification
Affected Versions & Remediation
Vulnerable Versions
Patched Versions
Technical Deep Dive
Attack Mechanism
The vulnerability exploits insufficient input validation in Super-linter's file discovery mechanism. The workflow processes filenames without proper sanitization, allowing shell command substitution syntax to be executed.
Exploitation Flow
Proof of Concept (Educational Purpose)
Malicious Filename Example:
Root Cause Analysis
The vulnerability stems from the file scanning logic within Super-linter that processes repository files. The scripts use unquoted variable expansion and command substitution patterns without proper escaping:
Vulnerable Code Pattern (Conceptual):
Secure Alternative:
Impact Assessment
Security Implications
1. Arbitrary Code Execution
2. Credential Exposure
GITHUB_TOKENwith repository permissions3. Supply Chain Attack Vector
Exploitation Prerequisites
For successful exploitation, the following conditions must be met:
pull_requesteventsGITHUB_TOKENwith write/delete accessAttack Scenarios
Scenario 1: Public Repository Attack
Scenario 2: Fork-Based Attack
Scenario 3: Internal Threat
Detection & Indicators of Compromise
Detection Methods
1. Workflow Log Analysis
Look for suspicious patterns in GitHub Actions logs:
2. File Naming Patterns
Monitor for suspicious filename patterns in Pull Requests:
3. Behavioral Indicators
Mitigation Strategies
Immediate Actions (Emergency Response)
1. Update Super-linter (CRITICAL - Priority 1)
2. Implement Workflow Restrictions (HIGH - Priority 2)
3. Token Permission Hardening (HIGH - Priority 3)
Long-Term Security Improvements
1. Input Validation Layer
2. Sandboxed Execution Environment
3. Monitoring & Alerting
Recommendations
For Repository Administrators
IMMEDIATE (0-24 hours):
SHORT-TERM (1-7 days):
LONG-TERM (Ongoing):
For Security Teams
Threat Intelligence:
Incident Response:
Security Architecture:
Additional Context & References
Related Security Advisories
Official Resources
Workflow Security Considerations
High-Risk Workflow Triggers:
pull_request_target: Has write access to base repositoryworkflow_call: Inherits caller's permissionspull_request: Can be exploited without this CVERecommended Configuration:
Conclusion
CVE-2026-25761 represents a significant security vulnerability in a widely-used GitHub Action. The command injection flaw demonstrates the critical importance of input validation in CI/CD security. Organizations must prioritize updating to Super-linter v8.3.1 and implementing comprehensive workflow security controls.
The discovery and responsible disclosure of this vulnerability highlights the essential role of security researchers in protecting the software supply chain. Continuous vigilance and proactive security measures remain paramount in maintaining secure development pipelines.
Report Compiled By:
Asrar Mared - The Warrior Bug Hunter
Security Researcher & Vulnerability Analyst
Contact: nike49424@proton.me
GitHub: @asrar-mared
Report Date: February 2026
Classification: Public
Version: 1.0
This report is provided for educational and defensive security purposes. Unauthorized exploitation of vulnerabilities is illegal and unethical.