CVE-2026-24844
Published: 04 February 2026
Summary
CVE-2026-24844 is a high-severity OS Command Injection (CWE-78) vulnerability in Chainguard Melange. Its CVSS base score is 7.9 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 1.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation and error handling of user-provided build inputs using ${{vars.*}} or ${{inputs.*}} before embedding into shell scripts without quote escaping, directly preventing command injection.
Mandates identification, reporting, and correction of the specific command injection flaw by patching melange to version 0.40.3.
Ensures the organization receives and acts on security advisories such as GHSA-vqqr-rmpc-hhg2, facilitating discovery and remediation of this CVE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection (CWE-78) directly enables arbitrary Unix shell execution via unsanitized ${{vars.*}}/${{inputs.*}} substitutions in shell scripts (T1059.004); exploitation of the vulnerable melange binary to achieve code execution matches T1203.
NVD Description
melange allows users to build apk packages using declarative pipelines. From version 0.3.0 to before 0.40.3, an attacker who can provide build input values, but not modify pipeline definitions, could execute arbitrary shell commands if the pipeline uses ${{vars.*}} or…
more
${{inputs.*}} substitutions in working-directory. The field is embedded into shell scripts without proper quote escaping. This issue has been patched in version 0.40.3.
Deeper analysisAI
CVE-2026-24844 is a command injection vulnerability (CWE-78) in melange, a tool for building APK packages using declarative pipelines. The issue affects versions from 0.3.0 up to but not including 0.40.3, where user-provided build input values using ${{vars.*}} or ${{inputs.*}} substitutions in the working-directory field are embedded into shell scripts without proper quote escaping, enabling arbitrary shell command execution. The vulnerability carries a CVSS v3.1 base score of 7.9 (AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N).
An attacker with the ability to supply build input values—but without permission to modify pipeline definitions—can exploit this if the pipeline incorporates the affected substitutions in working-directory. Exploitation requires local access, low privileges, low complexity, and user interaction, but achieves changed scope with high impacts on confidentiality and integrity, such as unauthorized data access or modification.
The vulnerability has been patched in melange version 0.40.3. Official advisories and the fixing commit are available on the Chainguard GitHub repository, including the security advisory at GHSA-vqqr-rmpc-hhg2 and the patch commit e51ca30cfb63178f5a86997d23d3fff0359fa6c8.
Details
- CWE(s)