8.6

CVE-2025-30154

Warnung
Exploit
reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs. Other reviewdog actions that use `reviewdog/action-setup@v1` that would also be compromised, regardless of version or pinning method, are reviewdog/action-shellcheck, reviewdog/action-composite-template, reviewdog/action-staticcheck, reviewdog/action-ast-grep, and reviewdog/action-typos.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ReviewdogAction-ast-grep Version < 1.26.2
ReviewdogAction-composite-template Version < 0.20.2
ReviewdogAction-setup Version1
ReviewdogAction-shellcheck Version < 1.29.2
ReviewdogAction-staticcheck Version < 1.26.2
ReviewdogAction-typos Version < 1.17.2

24.03.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

reviewdog/action-setup GitHub Action Embedded Malicious Code Vulnerability

Schwachstelle

reviewdog action-setup GitHub Action contains an embedded malicious code vulnerability that dumps exposed secrets to Github Actions Workflow Logs.

Beschreibung

Apply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 15.4% 0.945
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
security-advisories@github.com 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CWE-506 Embedded Malicious Code

The product contains code that appears to be malicious in nature.