CVE-2025-55192: CWE-94: Improper Control of Generation of Code ('Code Injection') in JurajNyiri HomeAssistant-Tapo-Control
HomeAssistant-Tapo-Control offers Control for Tapo cameras as a Home Assistant component. Prior to commit 2a3b80f, there is a code injection vulnerability in the GitHub Actions workflow .github/workflows/issues.yml. It does not affect users of the Home Assistant integration itself — it only impacts the GitHub Actions environment for this repository. The vulnerable workflow directly inserted user-controlled content from the issue body (github.event.issue.body) into a Bash conditional without proper sanitization. A malicious GitHub user could craft an issue body that executes arbitrary commands on the GitHub Actions runner in a privileged context whenever an issue is opened. The potential impact is limited to the repository’s CI/CD environment, which could allow access to repository contents or GitHub Actions secrets. This issue has been patched via commit 2a3b80f. Workarounds involve disabling the affected workflow (issues.yml), replacing the unsafe Bash comparison with a safe quoted grep (or a pure GitHub Actions expression check), or ensuring minimal permissions in workflows (permissions: block) to reduce possible impact.
AI Analysis
Technical Summary
CVE-2025-55192 is a high-severity code injection vulnerability (CWE-94) found in the GitHub Actions workflow of the HomeAssistant-Tapo-Control repository, a component designed to control Tapo cameras within the Home Assistant platform. The vulnerability exists in the .github/workflows/issues.yml file prior to commit 2a3b80ff128ddf4f410c97dd47a94343792ce43c. Specifically, the workflow unsafely inserts user-controlled input from the GitHub issue body (github.event.issue.body) directly into a Bash conditional statement without proper sanitization. This flaw allows a malicious GitHub user to craft an issue with specially designed content that executes arbitrary commands on the GitHub Actions runner. Since GitHub Actions runners often operate with elevated privileges and have access to repository contents and secrets, exploitation could lead to unauthorized access to sensitive data, including repository source code and secrets used in CI/CD processes. Importantly, this vulnerability does not affect the Home Assistant integration or end users controlling Tapo cameras; it is limited to the repository's CI/CD environment. The issue has been patched by replacing the unsafe Bash conditional with a safer quoted grep or a pure GitHub Actions expression check, and by applying minimal permissions to workflows to reduce impact. Workarounds include disabling the affected workflow or restricting permissions. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations using or contributing to the HomeAssistant-Tapo-Control project or similar GitHub repositories with comparable CI/CD workflows, this vulnerability poses a risk primarily to the integrity and confidentiality of the software development lifecycle. If exploited, attackers could execute arbitrary commands on GitHub Actions runners, potentially leaking sensitive repository data, including proprietary code and secrets such as API keys or credentials. This could lead to supply chain compromises, unauthorized access to connected IoT devices, or further lateral attacks within the organization’s infrastructure. Although the vulnerability does not impact the deployed Home Assistant integration directly, compromised CI/CD environments can undermine trust in software updates and releases, affecting organizations relying on this component for smart home automation. European entities involved in open source development or using GitHub Actions extensively should be aware of this risk to prevent potential supply chain attacks or leakage of intellectual property.
Mitigation Recommendations
Organizations should ensure that any usage of the HomeAssistant-Tapo-Control repository is updated to include the patched commit 2a3b80ff128ddf4f410c97dd47a94343792ce43c or later. For repositories with similar GitHub Actions workflows, review and sanitize all user-controlled inputs before use in shell commands. Replace unsafe Bash conditionals with safe quoted grep commands or GitHub Actions expression checks. Limit GitHub Actions workflow permissions to the minimum necessary by using the 'permissions' key with restrictive scopes (e.g., 'permissions: block') to reduce potential damage from compromised workflows. Disable or remove any workflows that process untrusted input without proper validation. Additionally, monitor GitHub Actions logs and audit repository secrets regularly to detect any suspicious activity. Implement strict branch protection rules and require code reviews for workflow changes to prevent introduction of similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-55192: CWE-94: Improper Control of Generation of Code ('Code Injection') in JurajNyiri HomeAssistant-Tapo-Control
Description
HomeAssistant-Tapo-Control offers Control for Tapo cameras as a Home Assistant component. Prior to commit 2a3b80f, there is a code injection vulnerability in the GitHub Actions workflow .github/workflows/issues.yml. It does not affect users of the Home Assistant integration itself — it only impacts the GitHub Actions environment for this repository. The vulnerable workflow directly inserted user-controlled content from the issue body (github.event.issue.body) into a Bash conditional without proper sanitization. A malicious GitHub user could craft an issue body that executes arbitrary commands on the GitHub Actions runner in a privileged context whenever an issue is opened. The potential impact is limited to the repository’s CI/CD environment, which could allow access to repository contents or GitHub Actions secrets. This issue has been patched via commit 2a3b80f. Workarounds involve disabling the affected workflow (issues.yml), replacing the unsafe Bash comparison with a safe quoted grep (or a pure GitHub Actions expression check), or ensuring minimal permissions in workflows (permissions: block) to reduce possible impact.
AI-Powered Analysis
Technical Analysis
CVE-2025-55192 is a high-severity code injection vulnerability (CWE-94) found in the GitHub Actions workflow of the HomeAssistant-Tapo-Control repository, a component designed to control Tapo cameras within the Home Assistant platform. The vulnerability exists in the .github/workflows/issues.yml file prior to commit 2a3b80ff128ddf4f410c97dd47a94343792ce43c. Specifically, the workflow unsafely inserts user-controlled input from the GitHub issue body (github.event.issue.body) directly into a Bash conditional statement without proper sanitization. This flaw allows a malicious GitHub user to craft an issue with specially designed content that executes arbitrary commands on the GitHub Actions runner. Since GitHub Actions runners often operate with elevated privileges and have access to repository contents and secrets, exploitation could lead to unauthorized access to sensitive data, including repository source code and secrets used in CI/CD processes. Importantly, this vulnerability does not affect the Home Assistant integration or end users controlling Tapo cameras; it is limited to the repository's CI/CD environment. The issue has been patched by replacing the unsafe Bash conditional with a safer quoted grep or a pure GitHub Actions expression check, and by applying minimal permissions to workflows to reduce impact. Workarounds include disabling the affected workflow or restricting permissions. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations using or contributing to the HomeAssistant-Tapo-Control project or similar GitHub repositories with comparable CI/CD workflows, this vulnerability poses a risk primarily to the integrity and confidentiality of the software development lifecycle. If exploited, attackers could execute arbitrary commands on GitHub Actions runners, potentially leaking sensitive repository data, including proprietary code and secrets such as API keys or credentials. This could lead to supply chain compromises, unauthorized access to connected IoT devices, or further lateral attacks within the organization’s infrastructure. Although the vulnerability does not impact the deployed Home Assistant integration directly, compromised CI/CD environments can undermine trust in software updates and releases, affecting organizations relying on this component for smart home automation. European entities involved in open source development or using GitHub Actions extensively should be aware of this risk to prevent potential supply chain attacks or leakage of intellectual property.
Mitigation Recommendations
Organizations should ensure that any usage of the HomeAssistant-Tapo-Control repository is updated to include the patched commit 2a3b80ff128ddf4f410c97dd47a94343792ce43c or later. For repositories with similar GitHub Actions workflows, review and sanitize all user-controlled inputs before use in shell commands. Replace unsafe Bash conditionals with safe quoted grep commands or GitHub Actions expression checks. Limit GitHub Actions workflow permissions to the minimum necessary by using the 'permissions' key with restrictive scopes (e.g., 'permissions: block') to reduce potential damage from compromised workflows. Disable or remove any workflows that process untrusted input without proper validation. Additionally, monitor GitHub Actions logs and audit repository secrets regularly to detect any suspicious activity. Implement strict branch protection rules and require code reviews for workflow changes to prevent introduction of similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-08T21:55:07.963Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689e16b9ad5a09ad005d0c81
Added to database: 8/14/2025, 5:02:49 PM
Last enriched: 9/12/2025, 11:20:18 PM
Last updated: 9/27/2025, 5:12:53 AM
Views: 49
Related Threats
CVE-2025-11140: XML External Entity Reference in Bjskzy Zhiyou ERP
MediumCVE-2025-11139: Path Traversal in Bjskzy Zhiyou ERP
MediumCVE-2025-11138: OS Command Injection in mirweiye wenkucms
MediumCVE-2025-11136: Unrestricted Upload in YiFang CMS
MediumCVE-2025-11135: Deserialization in pmTicket Project-Management-Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.