CVE-2025-68429: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in storybookjs storybook
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.
AI Analysis
Technical Summary
Storybook is a widely used frontend development tool that allows developers to build UI components in isolation. The vulnerability CVE-2025-68429 arises from how Storybook handles environment variables defined in .env files during the build process. Specifically, when running the `storybook build` command in a directory containing a .env file (or its variants like .env.local), Storybook may inadvertently bundle these environment variables into the static artifacts it generates. Since these artifacts are often published to the web for sharing or documentation purposes, the bundled source code becomes accessible to anyone with access to the published Storybook, thereby exposing sensitive environment variables such as API keys, tokens, or other secrets. This exposure violates confidentiality and can lead to further exploitation if attackers leverage the leaked secrets. The vulnerability affects multiple Storybook versions starting from 7.0.0 up to versions prior to 7.6.21, 8.6.15, 9.1.17, and 10.1.10. Notably, Storybook runtime environments (e.g., `storybook dev`) and deployed applications sharing the repository are not impacted. The issue is conditional on the presence of a .env file during build time and the public availability of the built Storybook. The maintainers recommend upgrading to patched versions immediately, auditing for any exposed secrets, and rotating them. Additionally, projects relying on the previous undocumented behavior of environment variable handling will need to adjust their configuration, such as prefixing variables with `STORYBOOK_` or using the `env` property in Storybook’s config, while avoiding inclusion of sensitive secrets in the build. The CVSS v3.1 score of 7.3 reflects a high severity due to network exploitable, no privileges required, no user interaction, and impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive information leakage, especially for companies that use Storybook to document or share UI components publicly or within semi-public environments. Exposure of environment variables can lead to unauthorized access to backend services, APIs, or cloud resources, potentially resulting in data breaches, service disruptions, or further lateral movement within corporate networks. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, and critical infrastructure) face increased compliance risks and potential fines if sensitive data is leaked. The impact is heightened for companies that embed secrets directly in .env files rather than using secure vaults or CI environment variables. Since Storybook is popular among frontend development teams across Europe, the risk is widespread, particularly for organizations that do not segregate build environments or restrict access to published Storybook instances. The vulnerability could also undermine trust in software supply chains if leaked secrets enable attackers to compromise downstream applications or services.
Mitigation Recommendations
European organizations should immediately upgrade all Storybook instances—both local development environments and CI/CD pipelines—to versions 7.6.21, 8.6.15, 9.1.17, or 10.1.10 or later. Audit all existing Storybook builds for the presence of sensitive environment variables in published artifacts and rotate any exposed secrets promptly. Avoid using .env files containing secrets during the build process; instead, use CI/CD environment variables or secret management solutions that do not write secrets to disk. Review and update Storybook configurations to use the `env` property or prefix environment variables with `STORYBOOK_` to prevent accidental bundling. Restrict access to published Storybook instances by implementing authentication and network controls, especially if public exposure is not required. Integrate automated scanning of built Storybook artifacts in CI pipelines to detect accidental inclusion of sensitive data. Educate development teams about the risks of embedding secrets in frontend build processes and enforce best practices for secret management. Finally, monitor for any suspicious activity that could indicate exploitation attempts leveraging leaked secrets.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-68429: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in storybookjs storybook
Description
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.
AI-Powered Analysis
Technical Analysis
Storybook is a widely used frontend development tool that allows developers to build UI components in isolation. The vulnerability CVE-2025-68429 arises from how Storybook handles environment variables defined in .env files during the build process. Specifically, when running the `storybook build` command in a directory containing a .env file (or its variants like .env.local), Storybook may inadvertently bundle these environment variables into the static artifacts it generates. Since these artifacts are often published to the web for sharing or documentation purposes, the bundled source code becomes accessible to anyone with access to the published Storybook, thereby exposing sensitive environment variables such as API keys, tokens, or other secrets. This exposure violates confidentiality and can lead to further exploitation if attackers leverage the leaked secrets. The vulnerability affects multiple Storybook versions starting from 7.0.0 up to versions prior to 7.6.21, 8.6.15, 9.1.17, and 10.1.10. Notably, Storybook runtime environments (e.g., `storybook dev`) and deployed applications sharing the repository are not impacted. The issue is conditional on the presence of a .env file during build time and the public availability of the built Storybook. The maintainers recommend upgrading to patched versions immediately, auditing for any exposed secrets, and rotating them. Additionally, projects relying on the previous undocumented behavior of environment variable handling will need to adjust their configuration, such as prefixing variables with `STORYBOOK_` or using the `env` property in Storybook’s config, while avoiding inclusion of sensitive secrets in the build. The CVSS v3.1 score of 7.3 reflects a high severity due to network exploitable, no privileges required, no user interaction, and impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive information leakage, especially for companies that use Storybook to document or share UI components publicly or within semi-public environments. Exposure of environment variables can lead to unauthorized access to backend services, APIs, or cloud resources, potentially resulting in data breaches, service disruptions, or further lateral movement within corporate networks. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, and critical infrastructure) face increased compliance risks and potential fines if sensitive data is leaked. The impact is heightened for companies that embed secrets directly in .env files rather than using secure vaults or CI environment variables. Since Storybook is popular among frontend development teams across Europe, the risk is widespread, particularly for organizations that do not segregate build environments or restrict access to published Storybook instances. The vulnerability could also undermine trust in software supply chains if leaked secrets enable attackers to compromise downstream applications or services.
Mitigation Recommendations
European organizations should immediately upgrade all Storybook instances—both local development environments and CI/CD pipelines—to versions 7.6.21, 8.6.15, 9.1.17, or 10.1.10 or later. Audit all existing Storybook builds for the presence of sensitive environment variables in published artifacts and rotate any exposed secrets promptly. Avoid using .env files containing secrets during the build process; instead, use CI/CD environment variables or secret management solutions that do not write secrets to disk. Review and update Storybook configurations to use the `env` property or prefix environment variables with `STORYBOOK_` to prevent accidental bundling. Restrict access to published Storybook instances by implementing authentication and network controls, especially if public exposure is not required. Integrate automated scanning of built Storybook artifacts in CI pipelines to detect accidental inclusion of sensitive data. Educate development teams about the risks of embedding secrets in frontend build processes and enforce best practices for secret management. Finally, monitor for any suspicious activity that could indicate exploitation attempts leveraging leaked secrets.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T15:29:39.379Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943327a058703ef3fcb5caf
Added to database: 12/17/2025, 10:45:14 PM
Last enriched: 12/17/2025, 11:00:03 PM
Last updated: 12/18/2025, 3:52:19 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumCVE-2025-14834: SQL Injection in code-projects Simple Stock System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.