CVE-2026-39866
Published: 21 April 2026
Description
Lawnchair is a free, open-source home app for Android. Prior to commit fcba413f55dd47f8a3921445252849126c6266b2, command injection in release_update.yml workflow dispatch input allows arbitrary code execution. Commit fcba413f55dd47f8a3921445252849126c6266b2 patches the issue.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates validation of untrusted inputs, directly preventing command injection via malicious workflow dispatch parameters in release_update.yml.
SA-10 requires developer configuration management during development and operation, ensuring secure handling of CI/CD workflow files like release_update.yml.
AC-6 enforces least privilege, limiting authenticated users' ability to trigger vulnerable workflow dispatches requiring PR:L access.
Security SummaryAI
CVE-2026-39866 is a command injection vulnerability (CWE-77) in the Lawnchair open-source Android launcher application. The issue resides in the release_update.yml GitHub Actions workflow, specifically in the handling of workflow dispatch inputs, which prior to commit fcba413f55dd47f8a3921445252849126c6266b2 allows attackers to execute arbitrary commands. Lawnchair users are not directly impacted, as the vulnerability affects the project's CI/CD pipeline on GitHub rather than the app itself. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and comprehensive impact on confidentiality, integrity, and availability.
Exploitation requires low privileges (PR:L), typically granted to authenticated GitHub users with permissions to trigger workflow dispatches on the Lawnchair repository, such as collaborators or contributors. An attacker could submit a malicious payload via the workflow dispatch input, leading to remote arbitrary code execution on the GitHub-hosted runners used by the repository. This could enable attackers to steal secrets, modify repository contents, deploy malicious code, or disrupt builds, potentially compromising the supply chain for Lawnchair releases.
The patching commit fcba413f55dd47f8a3921445252849126c6266b2 addresses the issue by sanitizing or validating the vulnerable input in release_update.yml, as detailed in the Lawnchair GitHub security advisory GHSA-9prc-pp2c-3427. Security practitioners monitoring open-source Android projects should verify that affected repositories have applied this commit and review workflow files for similar dispatch input risks, especially in public repositories with active contributors.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in GitHub Actions CI/CD workflow directly enables poisoned pipeline execution (T1677) and facilitates software supply chain compromise (T1195.002) via RCE on runners.