๐Ÿ” CVE Alert

CVE-2026-32948

UNKNOWN 0.0

sbt: Source dependency feature (via crafted VCS URL) leads to arbitrary code execution on Windows

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
7th

sbt is a build tool for Scala, Java, and others. From version 0.9.5 to before version 1.12.7, on Windows, sbt uses Process("cmd", "/c", ...) to run VCS commands (git, hg, svn). The URI fragment (branch, tag, revision) is user-controlled via the build definition and passed to these commands without validation. Because cmd /c interprets &, |, and ; as command separators, a malicious fragment can execute arbitrary commands. This issue has been patched in version 1.12.7.

CWE CWE-78
Vendor sbt
Product sbt
Published Mar 24, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for sbt sbt

Be the first to know when new unknown vulnerabilities affecting sbt sbt are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

sbt / sbt
>= 0.9.5, < 1.12.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/sbt/sbt/security/advisories/GHSA-x4ff-q6h8-v7gw github.com: https://github.com/sbt/sbt/commit/1ce945b6b79cbe3cef6c0fe9efbbd2904e0f479e github.com: https://github.com/sbt/sbt/commit/3a474ab060df4dbfa825a7e7bc97e00056519800 github.com: https://github.com/sbt/sbt/releases/tag/v1.12.7