Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62794: CWE-522: Insufficiently Protected Credentials in RichardoC github-workflow-updater-extension

0
Low
VulnerabilityCVE-2025-62794cvecve-2025-62794cwe-522
Published: Tue Oct 28 2025 (10/28/2025, 20:53:14 UTC)
Source: CVE Database V5
Vendor/Project: RichardoC
Product: github-workflow-updater-extension

Description

GitHub Workflow Updater is a VS Code extension that automatically pins GitHub Actions to specific commits for enhanced security. Before 0.0.7, any provided Github token would be stored in plaintext in the editor configuration as json on disk, rather than through the more secure "securestorage" api. An attacker with read only access to your home directory could have read this token and used it to perform actions with that token. Update to 0.0.7.

AI-Powered Analysis

AILast updated: 11/05/2025, 02:11:02 UTC

Technical Analysis

The vulnerability identified as CVE-2025-62794 affects the github-workflow-updater-extension developed by RichardoC, a Visual Studio Code extension designed to enhance security by pinning GitHub Actions to specific commits. In versions prior to 0.0.7, the extension improperly stored GitHub personal access tokens in plaintext within the editor's configuration file as JSON on disk. This practice violates secure credential storage principles, specifically CWE-522 (Insufficiently Protected Credentials). The tokens should have been stored using VS Code's secure storage API, which encrypts sensitive data and restricts access. Because the tokens are stored unencrypted, any attacker who gains read-only access to the user's home directory—such as through a compromised user account or malware with limited privileges—can extract these tokens. With the stolen token, the attacker can perform actions on GitHub with the same permissions as the user, potentially manipulating workflows, accessing repositories, or exfiltrating code. The vulnerability requires local access with low privileges and no user interaction, limiting its attack surface. The CVSS 3.1 score is 3.8 (low), reflecting the limited scope and complexity of exploitation. The issue was publicly disclosed on October 28, 2025, with no known exploits in the wild. The recommended remediation is to upgrade the extension to version 0.0.7 or later, which implements secure token storage using the secure storage API.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on developers and DevOps engineers who use the github-workflow-updater-extension in their VS Code environment. If an attacker gains read-only access to a developer's home directory, they could extract GitHub tokens and misuse them to manipulate CI/CD workflows, potentially injecting malicious code or disrupting automated deployment processes. This could lead to unauthorized code changes, exposure of proprietary source code, or disruption of software delivery pipelines. However, the requirement for local access and the low privilege level reduce the likelihood of widespread exploitation. Organizations with strict endpoint security and user access controls will be less vulnerable. Still, in environments where developer machines are shared, poorly secured, or exposed to insider threats, the risk increases. The vulnerability does not directly affect server infrastructure or cloud services but can serve as a stepping stone for further attacks within the software development lifecycle.

Mitigation Recommendations

European organizations should ensure all developers and DevOps personnel update the github-workflow-updater-extension to version 0.0.7 or later immediately. Additionally, implement endpoint security measures to restrict unauthorized access to user home directories, including enforcing strong user authentication, limiting local user privileges, and deploying host-based intrusion detection systems. Regularly audit and monitor access to developer workstations for suspicious activity. Encourage the use of multi-factor authentication (MFA) on GitHub accounts to reduce the impact of token compromise. Educate developers about secure credential storage practices and the risks of storing tokens in plaintext. Consider integrating secrets management solutions that centralize and secure tokens rather than relying on local storage. Finally, review and rotate GitHub tokens periodically to limit the window of opportunity for attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-22T18:55:48.011Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6901300969001fc67a67b9e5

Added to database: 10/28/2025, 9:05:13 PM

Last enriched: 11/5/2025, 2:11:02 AM

Last updated: 12/11/2025, 1:51:10 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats