VYPR
Critical severity9.1NVD Advisory· Published Apr 7, 2026· Updated Apr 16, 2026

CVE-2026-35580

CVE-2026-35580

Description

Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, GitHub Actions workflow files contained shell injection points where user-controlled workflow_dispatch inputs were interpolated directly into shell commands via ${{ }} expression syntax. An attacker with repository write access could inject arbitrary shell commands, leading to repository poisoning and supply chain compromise affecting all downstream users. This vulnerability is fixed in 8.39.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
gov.nsa.emissary:emissaryMaven
< 8.39.08.39.0

Affected products

1
  • cpe:2.3:a:nsa:emissary:*:*:*:*:*:*:*:*
    Range: >=5.10.0,<=8.38.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.