CVE-2026-25761
Summary
The Super-linter GitHub Action is vulnerable to command injection via crafted filenames. When this action is used in downstream GitHub Actions workflows, an attacker can submit a pull request that introduces a file whose name contains shell command substitution syntax, such as $(...). In affected Super-linter versions, runtime scripts may execute the embedded command during file discovery processing, enabling arbitrary command execution in the workflow runner context. This can be used to disclose the job’s GITHUB_TOKEN depending on how the workflow configures permissions.
Details
The issue appears originates in the logic that scans the repository for changed files to check.
- Use a workflow that runs Super-linter on
pull_requestevents. - Open a pull request that adds a new file with a crafted filename containing command substitution and an outbound request that includes
$GITHUB_TOKEN. - Run the workflow.
Impact
- Arbitrary command execution in the context of the workflow run that invokes Super-linter (triggered by attacker-controlled filenames in a PR).
- Credential exposure / misuse: the injected command can read environment variables available to the action, including
GITHUB_TOKEN.
The level of exposure depends on the source of the pull request.
To actively exploit the vulnerability, an attacker needs have the ability to run workflows without any approval from the repository admin.
Also, the GITHUB_TOKEN needs to have unconstrained access to repository resources. Even in that case, for pull request coming from forked repositories, no secrets are passed to the forked repository when running workflows triggered by pull_request events, and the GITHUB_TOKEN drops and write permission on the source repository source.
Finally, although not specific to this vulnerability, we recommend auditing workflow_call and pullrequesttarget workflows because they can lead to compromise, regardless of whether you're using Super-linter, or not, as explained by this GitHub Enterprise doc.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/super-linter/super-linter/security/advisories/GHSA-r79c-pqj3-577x, https://nvd.nist.gov/vuln/detail/CVE-2026-25761, https://github.com/super-linter/super-linter, https://github.com/super-linter/super-linter/releases/tag/v8.3.1
