Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-26189
February 19, 2026
Trivy Action runs Trivy as GitHub action to scan a Docker container image for vulnerabilities. A command injection vulnerability exists in "aquasecurity/trivy-action" versions 0.31.0 through 0.33.1 due to improper handling of action inputs when exporting environment variables. The action writes "export VAR=<input>" lines to "trivy_envs.txt" based on user-supplied inputs and subsequently sources this file in "entrypoint.sh". Because input values are written without appropriate shell escaping, attacker-controlled input containing shell metacharacters (e.g., "$(...)", backticks, or other command substitution syntax) may be evaluated during the sourcing process. This can result in arbitrary command execution within the GitHub Actions runner context. Version 0.34.0 contains a patch for this issue. The vulnerability is exploitable when a consuming workflow passes attacker-controlled data into any action input that is written to "trivy_envs.txt". Access to user input is required by the malicious actor. Workflows that do not pass attacker-controlled data into "trivy-action" inputs, workflows that upgrade to a patched version that properly escapes shell values or eliminates the "source ./trivy_envs.txt" pattern, and workflows where user input is not accessible are not affected.
Affected Packages
https://github.com/aquasecurity/trivy-action.git (GITHUB):
Affected version(s) >=0.31.0 <0.34.0
Fix Suggestion:
Update to version 0.34.0
Do you need more information?
Contact Us
CVSS v4
Base Score:
7.4
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.9
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
EPSS
Base Score:
0.09