CVE-2026-33634 - Vulnerability Analysis
N/aLast Updated: March 24, 2026
Aqua Security Trivy - Supply Chain Attack
Overview
Aqua Security Trivy v0.69.4, trivy-action 0.0.1–0.34.2, and setup-trivy 0.2.0–0.2.6 contain a supply chain attack caused by compromised credentials allowing malicious code injection in releases and GitHub Actions, letting attackers steal credentials and exfiltrate secrets, exploit requires compromised credentials.
Severity & Score
Impact
Attackers can steal credentials and exfiltrate secrets, leading to full compromise of affected pipelines and environments.
Mitigation
Update to Trivy versions 0.69.2 or 0.69.3, trivy-action 0.35.0, and setup-trivy 0.2.6 with safe commits; rotate all exposed secrets and pin GitHub Actions to immutable commit SHAs
References
Social Media Activity(1 post)
CVE-2026-33634: CRITICAL supply chain vuln in aquasecurity Trivy & GitHub Actions (<0.2.6) — credential-stealing malware deployed. Rotate all secrets, use safe versions, audit logs for 'tpcp-docs'. Full details: https://radar.offseq.com/threat/cve-2026-33634-cwe-506-embedded-malicious-code-in--163a34d0 #OffSeq #SupplyChain #CVE2026_33634
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33634
- Severity
- N/a
- Type
- supply_chain_attack
- Status
- unconfirmed
- EPSS
- 4.3%
- Social Posts
- 1
CWE
- CWE-506
CVSS Metrics
N/A