CVE-2026-24844

melange allows users to build apk packages using declarative pipelines. From version 0.3.0 to before 0.40.3, an attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipeline uses ${{vars.*}} or ${{inputs.*}} substitutions in working-directory. The field is embedded into shell scripts without proper quote escaping. This issue has been patched in version 0.40.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chainguard:melange:*:*:*:*:*:go:*:*

History

18 Feb 2026, 15:55

Type Values Removed Values Added
References () https://github.com/chainguard-dev/melange/commit/e51ca30cfb63178f5a86997d23d3fff0359fa6c8 - () https://github.com/chainguard-dev/melange/commit/e51ca30cfb63178f5a86997d23d3fff0359fa6c8 - Patch
References () https://github.com/chainguard-dev/melange/security/advisories/GHSA-vqqr-rmpc-hhg2 - () https://github.com/chainguard-dev/melange/security/advisories/GHSA-vqqr-rmpc-hhg2 - Patch, Vendor Advisory
Summary
  • (es) melange permite a los usuarios construir paquetes apk usando pipelines declarativos. Desde la versión 0.3.0 hasta antes de la 0.40.3, un atacante que puede proporcionar valores de entrada de construcción, pero no modificar las definiciones de pipeline, podría ejecutar comandos de shell arbitrarios si el pipeline usa sustituciones ${{vars.*}} o ${{inputs.*}} en working-directory. El campo se incrusta en scripts de shell sin el escape de comillas adecuado. Este problema ha sido parcheado en la versión 0.40.3.
First Time Chainguard melange
Chainguard
CPE cpe:2.3:a:chainguard:melange:*:*:*:*:*:go:*:*

04 Feb 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 20:16

Updated : 2026-02-18 15:55


NVD link : CVE-2026-24844

Mitre link : CVE-2026-24844

CVE.ORG link : CVE-2026-24844


JSON object : View

Products Affected

chainguard

  • melange
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')