Summary
External input from github.event.issue.title is used unsafely in a shell command in .github/workflows/release-candidate.yaml, allowing command injection during workflow execution.
Details
In .github/workflows/release-candidate.yaml, the issue title is interpolated directly into a shell command:
export VERSION=$(echo ${{ github.event.issue.title }} | sed -E 's/Release v?([0-9\.]*)/\1/g')
Because the issue title is attacker-controlled and is embedded directly into a shell command, shell metacharacters such as command substitution ($()) and command separators (;) can be interpreted by the shell.
Although the workflow checks that the title starts with Release , this condition can still be satisfied by a maliciously crafted input.
PoC
-
Create or edit an issue with the following title:
Release v1.2.3 $(whoami)
-
Trigger the workflow that processes the issue.
-
Observe that the injected command is executed on the runner.
The workflow logs show that $(whoami) is evaluated and its output (runner) appears in the command result, confirming that attacker-controlled input is executed within the shell.

Impact
This vulnerability allows command injection in the GitHub Actions runner through attacker-controlled issue titles. An attacker may be able to execute arbitrary commands within the context of the affected workflow job.
Depending on the workflow configuration (such as permissions and available secrets), successful exploitation could lead to:
- Unauthorized command execution in the CI environment
- Misuse of the
GITHUB_TOKEN
- Modification of repository state, release artifacts, or other workflow outputs
If the repository is public and allows untrusted users to create or reopen issues that trigger the workflow, this may be exploitable by external users.
This issue is limited to the repository's internal workflow configuration and does not directly affect downstream users of the published actions-mkdocs GitHub Action.
References
Summary
External input from
github.event.issue.titleis used unsafely in a shell command in.github/workflows/release-candidate.yaml, allowing command injection during workflow execution.Details
In
.github/workflows/release-candidate.yaml, the issue title is interpolated directly into a shell command:Because the issue title is attacker-controlled and is embedded directly into a shell command, shell metacharacters such as command substitution (
$()) and command separators (;) can be interpreted by the shell.Although the workflow checks that the title starts with
Release, this condition can still be satisfied by a maliciously crafted input.PoC
Create or edit an issue with the following title:
Trigger the workflow that processes the issue.
Observe that the injected command is executed on the runner.
The workflow logs show that
$(whoami)is evaluated and its output (runner) appears in the command result, confirming that attacker-controlled input is executed within the shell.Impact
This vulnerability allows command injection in the GitHub Actions runner through attacker-controlled issue titles. An attacker may be able to execute arbitrary commands within the context of the affected workflow job.
Depending on the workflow configuration (such as permissions and available secrets), successful exploitation could lead to:
GITHUB_TOKENIf the repository is public and allows untrusted users to create or reopen issues that trigger the workflow, this may be exploitable by external users.
This issue is limited to the repository's internal workflow configuration and does not directly affect downstream users of the published
actions-mkdocsGitHub Action.References