GHSA-3F44-XW83-3PMG

Bot Betrayal: RCE in Renovate's Helm Manager

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 14, 2026·8 min read·12 visits

Executive Summary (TL;DR)

Renovate versions 31.51.0 through 39.105.x contain a high-severity remote code execution vulnerability in the `helmv3` module. The tool fails to sanitize the `repository` field in `Chart.yaml` files before passing it to a shell command (`helm registry login`). Attackers with the ability to commit to a repository scanned by a self-hosted Renovate instance can execute arbitrary code on the runner infrastructure. The fix involves proper shell argument quoting.

A classic command injection vulnerability residing in the `helmv3` manager of the Renovate dependency automation tool. By crafting a malicious `Chart.yaml` file, an attacker can trick the Renovate runner into executing arbitrary shell commands during the OCI registry authentication process.

Technical Appendix

CVSS Score
6.7/ 10
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.04%
Top 100% most exploited

Affected Systems

Renovate CLI (Self-Hosted)Renovate Docker ImageRenovate EnterpriseMend Renovate

Affected Versions Detail

Product
Affected Versions
Fixed Version
Renovate
Mend / RenovateBot
>= 31.51.0 < 39.106.039.106.0
AttributeDetail
CWE IDCWE-77
Attack VectorNetwork / File (Chart.yaml)
CVSS Score6.7 (High)
Affected Componenthelmv3 manager / common.ts
ImpactRemote Code Execution (RCE)
Exploit StatusProof of Concept Available
CWE-77
Command Injection

Improper Neutralization of Special Elements used in a Command ('Command Injection')

Vulnerability Timeline

Vulnerability introduced in version 31.51.0
2022-01-24
Fixed version 39.106.0 released
2026-01-12
Advisory GHSA-3F44-XW83-3PMG published
2026-01-13

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.