#VU124689 Embedded malicious code (backdoor) in trivy - CVE-2026-33634

 

#VU124689 Embedded malicious code (backdoor) in trivy - CVE-2026-33634

Published: March 30, 2026


Vulnerability identifier: #VU124689
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2026-33634
CWE-ID: CWE-506
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
trivy
Software vendor:
Aqua Security

Description

The vulnerability allows a remote attacker to gain unauthorized access to the application.

The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) that allows a remote attacker to gain unauthorized access to the application.

A threat actor used used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. The attacked occurred on March 19.


Remediation

Vendor recommends downgrading to versions 0.69.2 or 0.69.3.

External links