PT-2026-27306 · Sbt · Sbt
Published
2026-03-24
·
Updated
2026-03-24
·
CVE-2026-32948
CVSS v4.0
6.7
Medium
| AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
sbt versions prior to 1.12.7
Description
On Windows, sbt utilizes
Process("cmd", "/c", ...) to execute VCS commands. The URI fragment, controlled by the user through the build definition, is passed to these commands without validation. The cmd /c interpreter treats characters like &, |, and ; as command separators, allowing a malicious fragment to execute arbitrary commands. This occurs because the uri.getFragment() is passed to the run() function without sanitization, and run() then uses Process("cmd", "/c", ...) on Windows. A proof of concept demonstrates the execution of arbitrary commands by crafting a malicious dependency URI.Recommendations
Update to sbt version 1.12.7 or later.
Fix
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Sbt