No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dbt-labs
Dbt-labs dbt-core |
|
| Vendors & Products |
Dbt-labs
Dbt-labs dbt-core |
Wed, 08 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Inside the reusable workflow dbt-labs/actions/blob/main/.github/workflows/open-issue-in-repo.yml, the prep job uses peter-evans/find-comment to search for an existing comment indicating that a docs issue has already been opened. The output steps.issue_comment.outputs.comment-body is then interpolated directly into a bash if statement. Because comment-body is attacker-controlled text and is inserted into shell syntax without escaping, a malicious comment body can break out of the quoted string and inject arbitrary shell commands. This vulnerability is fixed with commit bbed8d28354e9c644c5a7df13946a3a0451f9ab9. | |
| Title | dbt has a Command Injection in Reusable Workflow via Unsanitized comment-body Output | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T16:14:59.745Z
Reserved: 2026-04-06T22:06:40.515Z
Link: CVE-2026-39382
Updated: 2026-04-08T16:12:33.218Z
Status : Awaiting Analysis
Published: 2026-04-07T20:16:32.980
Modified: 2026-04-08T21:27:00.663
Link: CVE-2026-39382
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:23:04Z