CVE-2025-55192: CWE-94: Improper Control of Generation of Code ('Code Injection') in JurajNyiri HomeAssistant-Tapo-Control
HomeAssistant-Tapo-Control offers Control for Tapo cameras as a Home Assistant component. Prior to commit 2a3b80f, there is a code injection vulnerability in the GitHub Actions workflow .github/workflows/issues.yml. It does not affect users of the Home Assistant integration itself — it only impacts the GitHub Actions environment for this repository. The vulnerable workflow directly inserted user-controlled content from the issue body (github.event.issue.body) into a Bash conditional without proper sanitization. A malicious GitHub user could craft an issue body that executes arbitrary commands on the GitHub Actions runner in a privileged context whenever an issue is opened. The potential impact is limited to the repository’s CI/CD environment, which could allow access to repository contents or GitHub Actions secrets. This issue has been patched via commit 2a3b80f. Workarounds involve disabling the affected workflow (issues.yml), replacing the unsafe Bash comparison with a safe quoted grep (or a pure GitHub Actions expression check), or ensuring minimal permissions in workflows (permissions: block) to reduce possible impact.
AI Analysis
Technical Summary
CVE-2025-55192 is a high-severity code injection vulnerability (CWE-94) found in the GitHub Actions workflow of the HomeAssistant-Tapo-Control repository, a component designed to control Tapo cameras within the Home Assistant platform. The vulnerability exists in the .github/workflows/issues.yml file prior to commit 2a3b80ff128ddf4f410c97dd47a94343792ce43c. Specifically, the workflow unsafely incorporates user-controlled input from the GitHub issue body (github.event.issue.body) directly into a Bash conditional statement without proper sanitization or escaping. This flaw allows a malicious GitHub user to craft an issue with a specially designed body that executes arbitrary commands on the GitHub Actions runner. Since the runner operates with privileged access to the repository environment, this can lead to unauthorized access to repository contents and GitHub Actions secrets. Importantly, this vulnerability does not affect the Home Assistant integration or end users controlling Tapo cameras; it is confined to the CI/CD environment of the repository. The issue has been addressed by patching the workflow to safely handle user input, such as replacing unsafe Bash conditionals with quoted grep commands or GitHub Actions expression checks, and by recommending minimal permissions for workflows to limit impact. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations, the direct impact of this vulnerability is primarily on developers and maintainers who use the HomeAssistant-Tapo-Control repository or fork it, especially if they rely on GitHub Actions workflows for CI/CD. If exploited, attackers could gain access to sensitive repository data and secrets stored in GitHub Actions, potentially leading to further compromise of development pipelines or leaking of credentials. However, since the vulnerability does not affect the deployed Home Assistant integration or the Tapo camera control functionality itself, the risk to operational environments and end users is minimal. Organizations using Home Assistant with Tapo cameras but not contributing to or running this specific GitHub repository's workflows are not directly impacted. Nevertheless, organizations that maintain or contribute to open-source projects with similar CI/CD configurations should be aware of this class of vulnerabilities to prevent supply chain risks. The exposure of secrets or repository code could indirectly affect European companies relying on this software for automation or smart home management if attackers leverage stolen credentials or code to pivot into broader attacks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations and developers should: 1) Immediately update the HomeAssistant-Tapo-Control repository to include the patched commit (2a3b80ff128ddf4f410c97dd47a94343792ce43c) or later versions that sanitize user input in GitHub Actions workflows. 2) Disable or remove the vulnerable issues.yml workflow if it is not essential to their CI/CD process. 3) Replace unsafe Bash conditionals that incorporate user input with safe alternatives such as quoted grep commands or native GitHub Actions expression checks that do not invoke shell commands with unsanitized input. 4) Implement the principle of least privilege by restricting GitHub Actions workflow permissions using the permissions: block or minimal permission settings to reduce the impact of any potential compromise. 5) Regularly audit GitHub Actions workflows for similar injection risks, especially those processing user-generated content. 6) Monitor GitHub repositories for suspicious issue creation activity that could indicate exploitation attempts. 7) Educate developers about secure CI/CD practices and the risks of code injection in automation scripts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium
CVE-2025-55192: CWE-94: Improper Control of Generation of Code ('Code Injection') in JurajNyiri HomeAssistant-Tapo-Control
Description
HomeAssistant-Tapo-Control offers Control for Tapo cameras as a Home Assistant component. Prior to commit 2a3b80f, there is a code injection vulnerability in the GitHub Actions workflow .github/workflows/issues.yml. It does not affect users of the Home Assistant integration itself — it only impacts the GitHub Actions environment for this repository. The vulnerable workflow directly inserted user-controlled content from the issue body (github.event.issue.body) into a Bash conditional without proper sanitization. A malicious GitHub user could craft an issue body that executes arbitrary commands on the GitHub Actions runner in a privileged context whenever an issue is opened. The potential impact is limited to the repository’s CI/CD environment, which could allow access to repository contents or GitHub Actions secrets. This issue has been patched via commit 2a3b80f. Workarounds involve disabling the affected workflow (issues.yml), replacing the unsafe Bash comparison with a safe quoted grep (or a pure GitHub Actions expression check), or ensuring minimal permissions in workflows (permissions: block) to reduce possible impact.
AI-Powered Analysis
Technical Analysis
CVE-2025-55192 is a high-severity code injection vulnerability (CWE-94) found in the GitHub Actions workflow of the HomeAssistant-Tapo-Control repository, a component designed to control Tapo cameras within the Home Assistant platform. The vulnerability exists in the .github/workflows/issues.yml file prior to commit 2a3b80ff128ddf4f410c97dd47a94343792ce43c. Specifically, the workflow unsafely incorporates user-controlled input from the GitHub issue body (github.event.issue.body) directly into a Bash conditional statement without proper sanitization or escaping. This flaw allows a malicious GitHub user to craft an issue with a specially designed body that executes arbitrary commands on the GitHub Actions runner. Since the runner operates with privileged access to the repository environment, this can lead to unauthorized access to repository contents and GitHub Actions secrets. Importantly, this vulnerability does not affect the Home Assistant integration or end users controlling Tapo cameras; it is confined to the CI/CD environment of the repository. The issue has been addressed by patching the workflow to safely handle user input, such as replacing unsafe Bash conditionals with quoted grep commands or GitHub Actions expression checks, and by recommending minimal permissions for workflows to limit impact. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations, the direct impact of this vulnerability is primarily on developers and maintainers who use the HomeAssistant-Tapo-Control repository or fork it, especially if they rely on GitHub Actions workflows for CI/CD. If exploited, attackers could gain access to sensitive repository data and secrets stored in GitHub Actions, potentially leading to further compromise of development pipelines or leaking of credentials. However, since the vulnerability does not affect the deployed Home Assistant integration or the Tapo camera control functionality itself, the risk to operational environments and end users is minimal. Organizations using Home Assistant with Tapo cameras but not contributing to or running this specific GitHub repository's workflows are not directly impacted. Nevertheless, organizations that maintain or contribute to open-source projects with similar CI/CD configurations should be aware of this class of vulnerabilities to prevent supply chain risks. The exposure of secrets or repository code could indirectly affect European companies relying on this software for automation or smart home management if attackers leverage stolen credentials or code to pivot into broader attacks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations and developers should: 1) Immediately update the HomeAssistant-Tapo-Control repository to include the patched commit (2a3b80ff128ddf4f410c97dd47a94343792ce43c) or later versions that sanitize user input in GitHub Actions workflows. 2) Disable or remove the vulnerable issues.yml workflow if it is not essential to their CI/CD process. 3) Replace unsafe Bash conditionals that incorporate user input with safe alternatives such as quoted grep commands or native GitHub Actions expression checks that do not invoke shell commands with unsanitized input. 4) Implement the principle of least privilege by restricting GitHub Actions workflow permissions using the permissions: block or minimal permission settings to reduce the impact of any potential compromise. 5) Regularly audit GitHub Actions workflows for similar injection risks, especially those processing user-generated content. 6) Monitor GitHub repositories for suspicious issue creation activity that could indicate exploitation attempts. 7) Educate developers about secure CI/CD practices and the risks of code injection in automation scripts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-08T21:55:07.963Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689e16b9ad5a09ad005d0c81
Added to database: 8/14/2025, 5:02:49 PM
Last enriched: 8/14/2025, 5:18:17 PM
Last updated: 8/14/2025, 7:32:52 PM
Views: 2
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.