CVE-2025-30066: CWE-506 Embedded Malicious Code in tj-actions changed-files
tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)
AI Analysis
Technical Summary
CVE-2025-30066 is a high-severity vulnerability affecting the 'changed-files' component of the 'tj-actions' project, specifically versions before 46 (tags v1 through v45.0.7). This vulnerability arises from the presence of embedded malicious code introduced by a threat actor who modified the repository to point to a specific commit (0e58ed8) containing malicious 'updateFeatures' code. The malicious code enables remote attackers to read action logs, thereby discovering secrets that should remain confidential. The vulnerability is classified under CWE-506, which pertains to embedded malicious code, indicating that the malicious payload is hidden within legitimate code updates. The CVSS v3.1 score of 8.6 reflects a high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. No known exploits are reported in the wild yet, but the nature of the vulnerability—exposing secrets through logs—poses a significant risk, especially in automated CI/CD environments where 'tj-actions changed-files' is used to detect file changes in workflows. Attackers exploiting this vulnerability could gain access to sensitive credentials, tokens, or other secrets embedded in logs, potentially leading to further compromise of systems relying on these secrets.
Potential Impact
For European organizations, the impact of CVE-2025-30066 is substantial, particularly for those leveraging GitHub Actions or similar CI/CD pipelines that incorporate the 'tj-actions changed-files' tool. Exposure of secrets can lead to unauthorized access to internal systems, cloud environments, or third-party services, resulting in data breaches, intellectual property theft, or disruption of business operations. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened risks due to potential regulatory non-compliance (e.g., GDPR violations) if sensitive data is leaked. Additionally, the compromise of secrets could facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy ransomware. The fact that exploitation requires no authentication or user interaction increases the threat surface, making automated attacks feasible. European companies using automated workflows that rely on this component must consider the risk of secret leakage as a vector for broader cyberattacks.
Mitigation Recommendations
1. Immediate upgrade: Organizations should update 'tj-actions changed-files' to version 46 or later, where the malicious code has been removed and the vulnerability patched. 2. Audit and rotate secrets: Conduct a thorough audit of all secrets that may have been exposed via action logs during the affected period (tags v1 through v45.0.7) and rotate any potentially compromised credentials, tokens, or keys. 3. Review CI/CD pipeline logs: Examine logs generated by GitHub Actions or other CI/CD tools for unauthorized access or suspicious activity, focusing on the timeframe when the vulnerable versions were in use. 4. Implement secrets management best practices: Use dedicated secrets management solutions that avoid embedding secrets directly in logs or environment variables accessible to actions. 5. Restrict repository access: Limit write access to repositories and enforce strict code review policies to prevent unauthorized code modifications. 6. Monitor for indicators of compromise: Deploy monitoring tools to detect unusual access patterns or exfiltration attempts related to secrets. 7. Consider isolating CI/CD environments: Use ephemeral or sandboxed environments for running workflows to minimize exposure if secrets are leaked. 8. Engage with vendor/community: Stay informed about updates or patches from the 'tj-actions' maintainers and participate in security mailing lists or forums for timely alerts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-30066: CWE-506 Embedded Malicious Code in tj-actions changed-files
Description
tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)
AI-Powered Analysis
Technical Analysis
CVE-2025-30066 is a high-severity vulnerability affecting the 'changed-files' component of the 'tj-actions' project, specifically versions before 46 (tags v1 through v45.0.7). This vulnerability arises from the presence of embedded malicious code introduced by a threat actor who modified the repository to point to a specific commit (0e58ed8) containing malicious 'updateFeatures' code. The malicious code enables remote attackers to read action logs, thereby discovering secrets that should remain confidential. The vulnerability is classified under CWE-506, which pertains to embedded malicious code, indicating that the malicious payload is hidden within legitimate code updates. The CVSS v3.1 score of 8.6 reflects a high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. No known exploits are reported in the wild yet, but the nature of the vulnerability—exposing secrets through logs—poses a significant risk, especially in automated CI/CD environments where 'tj-actions changed-files' is used to detect file changes in workflows. Attackers exploiting this vulnerability could gain access to sensitive credentials, tokens, or other secrets embedded in logs, potentially leading to further compromise of systems relying on these secrets.
Potential Impact
For European organizations, the impact of CVE-2025-30066 is substantial, particularly for those leveraging GitHub Actions or similar CI/CD pipelines that incorporate the 'tj-actions changed-files' tool. Exposure of secrets can lead to unauthorized access to internal systems, cloud environments, or third-party services, resulting in data breaches, intellectual property theft, or disruption of business operations. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened risks due to potential regulatory non-compliance (e.g., GDPR violations) if sensitive data is leaked. Additionally, the compromise of secrets could facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy ransomware. The fact that exploitation requires no authentication or user interaction increases the threat surface, making automated attacks feasible. European companies using automated workflows that rely on this component must consider the risk of secret leakage as a vector for broader cyberattacks.
Mitigation Recommendations
1. Immediate upgrade: Organizations should update 'tj-actions changed-files' to version 46 or later, where the malicious code has been removed and the vulnerability patched. 2. Audit and rotate secrets: Conduct a thorough audit of all secrets that may have been exposed via action logs during the affected period (tags v1 through v45.0.7) and rotate any potentially compromised credentials, tokens, or keys. 3. Review CI/CD pipeline logs: Examine logs generated by GitHub Actions or other CI/CD tools for unauthorized access or suspicious activity, focusing on the timeframe when the vulnerable versions were in use. 4. Implement secrets management best practices: Use dedicated secrets management solutions that avoid embedding secrets directly in logs or environment variables accessible to actions. 5. Restrict repository access: Limit write access to repositories and enforce strict code review policies to prevent unauthorized code modifications. 6. Monitor for indicators of compromise: Deploy monitoring tools to detect unusual access patterns or exfiltration attempts related to secrets. 7. Consider isolating CI/CD environments: Use ephemeral or sandboxed environments for running workflows to minimize exposure if secrets are leaked. 8. Engage with vendor/community: Stay informed about updates or patches from the 'tj-actions' maintainers and participate in security mailing lists or forums for timely alerts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68881728ad5a09ad0088bc8f
Added to database: 7/29/2025, 12:34:48 AM
Last enriched: 7/29/2025, 12:48:17 AM
Last updated: 7/29/2025, 3:22:38 AM
Views: 3
Related Threats
CVE-2025-53649: Insertion of sensitive information into log file in SwitchBot SwitchBot App for iOS/Android
MediumCVE-2025-6495: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Bricks Builder Bricks
HighCVE-2025-4566: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in elemntor Elementor Website Builder – More Than Just a Page Builder
MediumCVE-2025-4370: CWE-862 Missing Authorization in themefusecom Brizy – Page Builder
MediumCVE-2025-3075: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in elemntor Elementor Website Builder – More Than Just a Page Builder
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.