Metrics
Affected Vendors & Products
Thu, 26 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Scala.epfl Scala.epfl sbt |
|
| CPEs | cpe:2.3:a:scala.epfl:sbt:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Scala.epfl Scala.epfl sbt |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 26 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sbt
Sbt sbt |
|
| Vendors & Products |
Sbt
Sbt sbt |
Wed, 25 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sbt is a build tool for Scala, Java, and others. From version 0.9.5 to before version 1.12.7, on Windows, sbt uses Process("cmd", "/c", ...) to run VCS commands (git, hg, svn). The URI fragment (branch, tag, revision) is user-controlled via the build definition and passed to these commands without validation. Because cmd /c interprets &, |, and ; as command separators, a malicious fragment can execute arbitrary commands. This issue has been patched in version 1.12.7. | |
| Title | sbt: Source dependency feature (via crafted VCS URL) leads to arbitrary code execution on Windows | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-26T13:21:23.354Z
Reserved: 2026-03-17T00:05:53.284Z
Link: CVE-2026-32948
Updated: 2026-03-25T13:28:23.163Z
Status : Analyzed
Published: 2026-03-24T20:16:27.180
Modified: 2026-03-26T20:27:54.670
Link: CVE-2026-32948