Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30066: CWE-506 Embedded Malicious Code in tj-actions changed-files

0
High
VulnerabilityCVE-2025-30066cvecve-2025-30066cwe-506
Published: Sat Mar 15 2025 (03/15/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: tj-actions
Product: changed-files

Description

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:03:25 UTC

Technical Analysis

CVE-2025-30066 is a vulnerability classified under CWE-506 (Embedded Malicious Code) affecting the tj-actions changed-files project, specifically versions before 46. The vulnerability stems from a malicious commit (0e58ed8) introduced by a threat actor into versions v1 through v45.0.7 during March 14-15, 2025. This commit embedded malicious code within the updateFeatures function, which caused the action logs generated by the changed-files GitHub Action to leak sensitive secrets. Because the logs are accessible remotely, attackers can read them without any authentication or user interaction, leading to a confidentiality breach. The CVSS 3.1 score is 8.6 (high), reflecting the network attack vector, low complexity, no privileges required, no user interaction, and a scope change with high confidentiality impact but no impact on integrity or availability. The vulnerability affects CI/CD pipelines and development workflows that rely on tj-actions changed-files for detecting changed files in repositories. The malicious code's presence in official tags means many users could have unknowingly deployed compromised workflows, increasing the risk of secret leakage. Although no exploits are currently known in the wild, the potential for secret disclosure is significant, especially in environments where sensitive credentials or tokens are stored in GitHub Actions logs.

Potential Impact

The primary impact of CVE-2025-30066 is the unauthorized disclosure of sensitive secrets such as API keys, tokens, or credentials stored or exposed in GitHub Actions logs. This can lead to further compromise of organizational assets, including cloud infrastructure, internal services, or third-party integrations. Since the vulnerability requires no authentication or user interaction, attackers can remotely access logs and extract secrets, potentially leading to lateral movement, data breaches, or service disruptions. The scope change in the CVSS vector indicates that the vulnerability affects components beyond the immediate changed-files action, possibly impacting the entire CI/CD pipeline's security posture. Organizations relying on affected versions may face compliance violations, reputational damage, and operational risks if secrets are leaked. The lack of known exploits in the wild suggests that proactive patching can prevent exploitation, but the malicious commit's presence in official releases means many users might have been exposed unknowingly.

Mitigation Recommendations

1. Immediately upgrade tj-actions changed-files to version 46 or later, which removes the malicious commit and fixes the vulnerability. 2. Audit all GitHub Actions logs generated between March 14-15, 2025, for any exposed secrets and rotate any credentials or tokens that may have been leaked. 3. Implement strict access controls on GitHub Actions logs to limit who can view sensitive information. 4. Use GitHub's secret scanning and monitoring tools to detect any leaked secrets in repositories or logs. 5. Employ ephemeral or short-lived secrets in CI/CD pipelines to minimize the impact of potential leaks. 6. Review and harden CI/CD workflows to avoid logging sensitive information unnecessarily. 7. Monitor threat intelligence sources for any emerging exploits targeting this vulnerability. 8. Consider implementing additional runtime security controls to detect anomalous access to logs or secrets. 9. Educate development and DevOps teams about the risks of embedded malicious code and the importance of verifying third-party action integrity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881728ad5a09ad0088bc8f

Added to database: 7/29/2025, 12:34:48 AM

Last enriched: 2/27/2026, 12:03:25 AM

Last updated: 3/26/2026, 9:15:50 AM

Views: 187

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses