🔐 CVE Alert

CVE-2026-45803

LOW 3.5

gh: GitHub Actions log output in `gh run view` allows terminal escape sequence injection

CVSS Score
3.5
EPSS Score
0.0%
EPSS Percentile
0th

`gh` is GitHub’s official command line tool. From 1.6.0 to before 2.92.0, a security vulnerability has been identified in GitHub CLI that could allow terminal escape sequence injection when users view GitHub Actions workflow logs using gh run view --log or gh run view --log-failed. The vulnerability stems from the way GitHub CLI handles raw Actions log output. The gh run view --log and gh run view --log-failed commands stream workflow log lines to stdout or the configured pager without sanitizing terminal control sequences. An attacker who can influence GitHub Actions log content, for example via a PR triggered workflow, can embed escape sequences that are replayed in the user's terminal when they inspect the run. Depending on the victim's terminal emulator, injected sequences could change the window title, manipulate on screen content, or in some terminal emulators (such as screen) potentially execute arbitrary commands. This vulnerability is fixed in 2.92.0.

CWE CWE-150
Vendor cli
Product cli
Published May 15, 2026
Stay Ahead of the Next One

Get instant alerts for cli cli

Be the first to know when new low vulnerabilities affecting cli cli are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Affected Versions

cli / cli
>= 1.6.0, < 2.92.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/cli/cli/security/advisories/GHSA-crc3-h8v6-qh57