CVE-2026-33634
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2026-03-23

Last updated on: 2026-03-30

Assigner: GitHub, Inc.

Description
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. This incident is a continuation of the supply chain attack that began in late February 2026. Following the initial disclosure on March 1, credential rotation was performed but was not atomic (not all credentials were revoked simultaneously). The attacker could have use a valid token to exfiltrate newly rotated secrets during the rotation window (which lasted a few days). This could have allowed the attacker to retain access and execute the March 19 attack. Affected components include the `aquasecurity/trivy` Go / Container image version 0.69.4, the `aquasecurity/trivy-action` GitHub Action versions 0.0.1 – 0.34.2 (76/77), and the`aquasecurity/setup-trivy` GitHub Action versions 0.2.0 – 0.2.6, prior to the recreation of 0.2.6 with a safe commit. Known safe versions include versions 0.69.2 and 0.69.3 of the Trivy binary, version 0.35.0 of trivy-action, and version 0.2.6 of setup-trivy. Additionally, take other mitigations to ensure the safety of secrets. If there is any possibility that a compromised version ran in one's environment, all secrets accessible to affected pipelines must be treated as exposed and rotated immediately. Check whether one's organization pulled or executed Trivy v0.69.4 from any source. Remove any affected artifacts immediately. Review all workflows using `aquasecurity/trivy-action` or `aquasecurity/setup-trivy`. Those who referenced a version tag rather than a full commit SHA should check workflow run logs from March 19–20, 2026 for signs of compromise. Look for repositories named `tpcp-docs` in one's GitHub organization. The presence of such a repository may indicate that the fallback exfiltration mechanism was triggered and secrets were successfully stolen. Pin GitHub Actions to full, immutable commit SHA hashes, don't use mutable version tags.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-30
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
telnyx telnyx 4.87.1
telnyx telnyx 4.87.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-506 The product contains code that appears to be malicious in nature.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves a supply chain attack on the Trivy security scanner and its related GitHub Actions. On March 19, 2026, an attacker used compromised credentials to publish a malicious version (v0.69.4) of Trivy, force-push most version tags of the aquasecurity/trivy-action repository to credential-stealing malware, and replace all tags in aquasecurity/setup-trivy with malicious commits.

The attack was possible because credential rotation was not atomic, allowing the attacker to retain access during the rotation window and execute the attack. The compromised versions include Trivy v0.69.4, trivy-action versions 0.0.1 to 0.34.2 (except one), and setup-trivy versions 0.2.0 to 0.2.6 before a safe commit was recreated.

Users who pulled or executed these compromised versions may have had their secrets exposed and should immediately rotate all secrets accessible to affected pipelines and remove any affected artifacts.


How can this vulnerability impact me? :

This vulnerability can lead to the exposure and theft of sensitive credentials and secrets used in your development and deployment pipelines.

If a compromised version of Trivy or its GitHub Actions was used in your environment, attackers could have stolen secrets, potentially allowing unauthorized access to your systems, data, or infrastructure.

This could result in further compromise, data breaches, or unauthorized actions within your environment.

  • Immediate secret rotation is necessary if there is any chance the compromised versions were used.
  • Affected artifacts and workflows should be removed or updated to safe versions.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability, review your environment for usage of affected versions of Trivy and related GitHub Actions. Specifically, check if Trivy v0.69.4 was pulled or executed, and if workflows use aquasecurity/trivy-action versions 0.0.1 to 0.34.2 or aquasecurity/setup-trivy versions 0.2.0 to 0.2.6 prior to the safe commit.

Examine workflow run logs from March 19–20, 2026 for signs of compromise, especially if version tags rather than full commit SHAs were used.

Look for repositories named 'tpcp-docs' in your GitHub organization, as their presence may indicate successful exfiltration of secrets.

Suggested commands include searching your CI/CD logs and repositories for usage of the affected versions and suspicious repositories. For example, use git commands to check tags and commits in your workflows, and GitHub API or CLI to list repositories and workflow runs.


What immediate steps should I take to mitigate this vulnerability?

Immediately remove any affected artifacts such as Trivy v0.69.4 and vulnerable versions of aquasecurity/trivy-action and aquasecurity/setup-trivy from your environment.

Rotate all secrets accessible to affected pipelines, treating them as exposed.

Review all workflows using the affected GitHub Actions and pin them to full, immutable commit SHA hashes instead of mutable version tags.

Check for the presence of suspicious repositories like 'tpcp-docs' that may indicate exfiltration and take appropriate incident response actions.

Use known safe versions: Trivy binary versions 0.69.2 and 0.69.3, trivy-action version 0.35.0, and setup-trivy version 0.2.6 with the safe commit.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart