Description

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

INFO

Published Date :

2025-03-15T00:00:00.000Z

Last Modified :

2025-03-17T15:47:54.790Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-30066 vulnerability.

No data.

REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-30066.

URL Resource
https://github.com/chains-project/maven-lockfile/pull/1111 cve-icon cve-icon
https://github.com/espressif/arduino-esp32/issues/11127 cve-icon cve-icon
https://github.com/github/docs/blob/962a1c8dccb8c0f66548b324e5b921b5e4fbc3d6/content/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions.md?plain=1#L191-L193 cve-icon cve-icon
https://github.com/modal-labs/modal-examples/issues/1100 cve-icon cve-icon
https://github.com/rackerlabs/genestack/pull/903 cve-icon cve-icon
https://github.com/tj-actions/changed-files/blob/45fb12d7a8bedb4da42342e52fe054c6c2c3fd73/README.md?plain=1#L20-L28 cve-icon cve-icon
https://github.com/tj-actions/changed-files/issues/2463 cve-icon cve-icon
https://github.com/tj-actions/changed-files/issues/2464 cve-icon cve-icon
https://github.com/tj-actions/changed-files/issues/2477 cve-icon cve-icon
https://news.ycombinator.com/item?id=43367987 cve-icon cve-icon
https://news.ycombinator.com/item?id=43368870 cve-icon cve-icon
https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/ cve-icon cve-icon
https://sysdig.com/blog/detecting-and-mitigating-the-tj-actions-changed-files-supply-chain-attack-cve-2025-30066/ cve-icon cve-icon
https://web.archive.org/web/20250315060250/https://github.com/tj-actions/changed-files/issues/2463 cve-icon cve-icon
https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised cve-icon cve-icon
https://www.stream.security/post/github-action-supply-chain-attack-exposes-secrets-what-you-need-to-know-and-how-to-respond cve-icon cve-icon
https://www.sweet.security/blog/cve-2025-30066-tj-actions-supply-chain-attack cve-icon cve-icon
https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066 cve-icon cve-icon

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact