CVE-2025-30154

March 19, 2025, 4:15 p.m.

8.6
High

Description

reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs. Other reviewdog actions that use `reviewdog/action-setup@v1` that would also be compromised, regardless of version or pinning method, are reviewdog/action-shellcheck, reviewdog/action-composite-template, reviewdog/action-staticcheck, reviewdog/action-ast-grep, and reviewdog/action-typos.

Product(s) Impacted

Vendor Product Versions
Reviewdog
  • Action-setup
  • Action-shellcheck
  • Action-composite-template
  • Action-staticcheck
  • Action-ast-grep
  • Action-typos
  • v1
  • *
  • *
  • *
  • *
  • *

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-506
Embedded Malicious Code
The product contains code that appears to be malicious in nature.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a reviewdog action-setup v1 / / / / / / /
a reviewdog action-shellcheck / / / / / / /
a reviewdog action-composite-template / / / / / / /
a reviewdog action-staticcheck / / / / / / /
a reviewdog action-ast-grep / / / / / / /
a reviewdog action-typos / / / / / / /

CVSS Score

8.6 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: NONE
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

    View Vector String

Timeline

Published: March 19, 2025, 4:15 p.m.
Last Modified: March 19, 2025, 4:15 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security-advisories@github.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.