CVE-2026-32948 PUBLISHED

sbt: Source dependency feature (via crafted VCS URL) leads to arbitrary code execution on Windows

Assigner: GitHub_M
Reserved: 17.03.2026 Published: 24.03.2026 Updated: 25.03.2026

sbt is a build tool for Scala, Java, and others. From version 0.9.5 to before version 1.12.7, on Windows, sbt uses Process("cmd", "/c", ...) to run VCS commands (git, hg, svn). The URI fragment (branch, tag, revision) is user-controlled via the build definition and passed to these commands without validation. Because cmd /c interprets &, |, and ; as command separators, a malicious fragment can execute arbitrary commands. This issue has been patched in version 1.12.7.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.7

Product Status

Vendor sbt
Product sbt
Versions
  • Version >= 0.9.5, < 1.12.7 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE