Vulnerability Details CVE-2022-39326
kartverket/github-workflows are shared reusable workflows for GitHub Actions. Prior to version 2.7.5, all users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected by a code injection vulnerability. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow. Users should upgrade to at least version 2.7.5 to resolve the issue. As a workaround, review any pull requests from external users for malicious payloads before allowing them to trigger a build.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.6%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2022-39326
-
cpe:2.3:a:kartverket:github-workflows:1
-
cpe:2.3:a:kartverket:github-workflows:2
-
cpe:2.3:a:kartverket:github-workflows:2.1
-
cpe:2.3:a:kartverket:github-workflows:2.2
-
cpe:2.3:a:kartverket:github-workflows:2.3
-
cpe:2.3:a:kartverket:github-workflows:2.4
-
cpe:2.3:a:kartverket:github-workflows:2.6
-
cpe:2.3:a:kartverket:github-workflows:2.7
-
cpe:2.3:a:kartverket:github-workflows:2.7.1
-
cpe:2.3:a:kartverket:github-workflows:2.7.2
-
cpe:2.3:a:kartverket:github-workflows:2.7.3
-
cpe:2.3:a:kartverket:github-workflows:2.7.4