Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-30066
Analyzed
Known KEV
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-15 Mar, 2025 | 06:15
Updated At-29 Mar, 2025 | 01:00

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2025-03-182025-04-08tj-actions/changed-files GitHub Action Embedded Malicious Code VulnerabilityApply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Primary3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CPE Matches

tj-actions
tj-actions
>>changed-files>>Versions up to 45.0.7(inclusive)
cpe:2.3:a:tj-actions:changed-files:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-506Secondarycve@mitre.org
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.gitguardian.com/compromised-tj-actions/cve@mitre.org
Exploit
Third Party Advisory
https://github.com/chains-project/maven-lockfile/pull/1111cve@mitre.org
Issue Tracking
https://github.com/espressif/arduino-esp32/issues/11127cve@mitre.org
Issue Tracking
https://github.com/github/docs/blob/962a1c8dccb8c0f66548b324e5b921b5e4fbc3d6/content/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions.md?plain=1#L191-L193cve@mitre.org
Product
https://github.com/modal-labs/modal-examples/issues/1100cve@mitre.org
Issue Tracking
https://github.com/rackerlabs/genestack/pull/903cve@mitre.org
Issue Tracking
https://github.com/tj-actions/changed-files/blob/45fb12d7a8bedb4da42342e52fe054c6c2c3fd73/README.md?plain=1#L20-L28cve@mitre.org
Product
https://github.com/tj-actions/changed-files/issues/2463cve@mitre.org
Issue Tracking
https://github.com/tj-actions/changed-files/issues/2464cve@mitre.org
Issue Tracking
https://github.com/tj-actions/changed-files/issues/2477cve@mitre.org
Issue Tracking
https://news.ycombinator.com/item?id=43367987cve@mitre.org
Issue Tracking
Third Party Advisory
https://news.ycombinator.com/item?id=43368870cve@mitre.org
Issue Tracking
Third Party Advisory
https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/cve@mitre.org
Third Party Advisory
https://sysdig.com/blog/detecting-and-mitigating-the-tj-actions-changed-files-supply-chain-attack-cve-2025-30066/cve@mitre.org
Mitigation
Third Party Advisory
https://web.archive.org/web/20250315060250/https://github.com/tj-actions/changed-files/issues/2463cve@mitre.org
Issue Tracking
https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromisedcve@mitre.org
Exploit
Mitigation
Third Party Advisory
https://www.stream.security/post/github-action-supply-chain-attack-exposes-secrets-what-you-need-to-know-and-how-to-respondcve@mitre.org
Third Party Advisory
https://www.sweet.security/blog/cve-2025-30066-tj-actions-supply-chain-attackcve@mitre.org
Third Party Advisory
https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066cve@mitre.org
Third Party Advisory
https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-github-action-cve-2025-30066af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
Change History
0Changes found

Details not found