Skip to main content

CVE-2025-30066: CWE-506 Embedded Malicious Code in tj-actions changed-files

High
VulnerabilityCVE-2025-30066cvecve-2025-30066cwe-506
Published: Sat Mar 15 2025 (03/15/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: tj-actions
Product: changed-files

Description

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

AI-Powered Analysis

AILast updated: 07/29/2025, 00:48:17 UTC

Technical Analysis

CVE-2025-30066 is a high-severity vulnerability affecting the 'changed-files' component of the 'tj-actions' project, specifically versions before 46 (tags v1 through v45.0.7). This vulnerability arises from the presence of embedded malicious code introduced by a threat actor who modified the repository to point to a specific commit (0e58ed8) containing malicious 'updateFeatures' code. The malicious code enables remote attackers to read action logs, thereby discovering secrets that should remain confidential. The vulnerability is classified under CWE-506, which pertains to embedded malicious code, indicating that the malicious payload is hidden within legitimate code updates. The CVSS v3.1 score of 8.6 reflects a high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. No known exploits are reported in the wild yet, but the nature of the vulnerability—exposing secrets through logs—poses a significant risk, especially in automated CI/CD environments where 'tj-actions changed-files' is used to detect file changes in workflows. Attackers exploiting this vulnerability could gain access to sensitive credentials, tokens, or other secrets embedded in logs, potentially leading to further compromise of systems relying on these secrets.

Potential Impact

For European organizations, the impact of CVE-2025-30066 is substantial, particularly for those leveraging GitHub Actions or similar CI/CD pipelines that incorporate the 'tj-actions changed-files' tool. Exposure of secrets can lead to unauthorized access to internal systems, cloud environments, or third-party services, resulting in data breaches, intellectual property theft, or disruption of business operations. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened risks due to potential regulatory non-compliance (e.g., GDPR violations) if sensitive data is leaked. Additionally, the compromise of secrets could facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy ransomware. The fact that exploitation requires no authentication or user interaction increases the threat surface, making automated attacks feasible. European companies using automated workflows that rely on this component must consider the risk of secret leakage as a vector for broader cyberattacks.

Mitigation Recommendations

1. Immediate upgrade: Organizations should update 'tj-actions changed-files' to version 46 or later, where the malicious code has been removed and the vulnerability patched. 2. Audit and rotate secrets: Conduct a thorough audit of all secrets that may have been exposed via action logs during the affected period (tags v1 through v45.0.7) and rotate any potentially compromised credentials, tokens, or keys. 3. Review CI/CD pipeline logs: Examine logs generated by GitHub Actions or other CI/CD tools for unauthorized access or suspicious activity, focusing on the timeframe when the vulnerable versions were in use. 4. Implement secrets management best practices: Use dedicated secrets management solutions that avoid embedding secrets directly in logs or environment variables accessible to actions. 5. Restrict repository access: Limit write access to repositories and enforce strict code review policies to prevent unauthorized code modifications. 6. Monitor for indicators of compromise: Deploy monitoring tools to detect unusual access patterns or exfiltration attempts related to secrets. 7. Consider isolating CI/CD environments: Use ephemeral or sandboxed environments for running workflows to minimize exposure if secrets are leaked. 8. Engage with vendor/community: Stay informed about updates or patches from the 'tj-actions' maintainers and participate in security mailing lists or forums for timely alerts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881728ad5a09ad0088bc8f

Added to database: 7/29/2025, 12:34:48 AM

Last enriched: 7/29/2025, 12:48:17 AM

Last updated: 7/29/2025, 3:22:38 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats