melange allows users to build apk packages using declarative pipelines. From version 0.3.0 to before 0.40.3, an attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipeline uses ${{vars.*}} or ${{inputs.*}} substitutions in working-directory. The field is embedded into shell scripts without proper quote escaping. This issue has been patched in version 0.40.3.
References
| Link | Resource |
|---|---|
| https://github.com/chainguard-dev/melange/commit/e51ca30cfb63178f5a86997d23d3fff0359fa6c8 | Patch |
| https://github.com/chainguard-dev/melange/security/advisories/GHSA-vqqr-rmpc-hhg2 | Patch Vendor Advisory |
Configurations
History
18 Feb 2026, 15:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/chainguard-dev/melange/commit/e51ca30cfb63178f5a86997d23d3fff0359fa6c8 - Patch | |
| References | () https://github.com/chainguard-dev/melange/security/advisories/GHSA-vqqr-rmpc-hhg2 - Patch, Vendor Advisory | |
| Summary |
|
|
| First Time |
Chainguard melange
Chainguard |
|
| CPE | cpe:2.3:a:chainguard:melange:*:*:*:*:*:go:*:* |
04 Feb 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-04 20:16
Updated : 2026-02-18 15:55
NVD link : CVE-2026-24844
Mitre link : CVE-2026-24844
CVE.ORG link : CVE-2026-24844
JSON object : View
Products Affected
chainguard
- melange
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
