melange pipeline working-directory could allow command injection
Description
Published to the GitHub Advisory Database
Feb 3, 2026
Reviewed
Feb 3, 2026
Published by the National Vulnerability Database
Feb 4, 2026
Last updated
Feb 4, 2026
An attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipeline uses
${{vars.*}}or${{inputs.*}}substitutions inworking-directory. The field is embedded into shell scripts without proper quote escaping.Fix: Fixed with e51ca30c, Released.
Acknowledgements
melange thanks Oleh Konko from 1seal for discovering and reporting this issue.
References