{"id":"CVE-2026-34243","summary":"wenxian: Command Injection in GitHub Actions Workflow via `issue_comment.body`","details":"wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allowing potential command injection and arbitrary code execution on the runner. At time of publication, there are no publicly available patches.","aliases":["GHSA-r4fj-r33x-8v88"],"modified":"2026-04-02T13:29:27.665356Z","published":"2026-03-31T15:49:27.333Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34243.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-77","CWE-78"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34243.json"},{"type":"ADVISORY","url":"https://github.com/njzjz/wenxian/security/advisories/GHSA-r4fj-r33x-8v88"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34243"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/njzjz/wenxian","events":[{"introduced":"0"},{"last_affected":"8172ac1b295ad07c80aced2177e5c2585801d329"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.3.1"}]}}],"versions":["v0.0.1","v0.0.10","v0.0.11","v0.0.12","v0.0.2","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.0.8","v0.0.9","v0.1.0","v0.1.1","v0.2.0","v0.3.0","v0.3.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-34243.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}