CVE-2025-53546
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-09

Last updated on: 2025-07-10

Assigner: GitHub, Inc.

Description
Folo organizes feeds content into one timeline. Using pull_request_target on .github/workflows/auto-fix-lint-format-commit.yml can be exploited by attackers, since untrusted code can be executed having full access to secrets (from the base repo). By exploiting the vulnerability is possible to exfiltrate GITHUB_TOKEN which has high privileges. GITHUB_TOKEN can be used to completely overtake the repo since the token has content write privileges. This vulnerability is fixed in commit 585c6a591440cd39f92374230ac5d65d7dd23d6a.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-09
Last Modified
2025-07-10
Generated
2026-05-07
AI Q&A
2025-07-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
github actions *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-829 The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the use of pull_request_target in the GitHub Actions workflow file .github/workflows/auto-fix-lint-format-commit.yml. Attackers can exploit this to execute untrusted code with full access to secrets from the base repository. Specifically, they can exfiltrate the GITHUB_TOKEN, which has high privileges including content write access, allowing them to potentially take over the repository.


How can this vulnerability impact me? :

Exploiting this vulnerability allows attackers to gain full access to the repository's secrets and write privileges via the GITHUB_TOKEN. This can lead to a complete takeover of the repository, unauthorized code changes, data exfiltration, and compromise of the integrity and security of the project.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update your repository to include the fix from commit 585c6a591440cd39f92374230ac5d65d7dd23d6a which addresses the issue with using pull_request_target in the .github/workflows/auto-fix-lint-format-commit.yml workflow. Avoid using pull_request_target with untrusted code to prevent execution with full access to secrets. Review and restrict permissions of GITHUB_TOKEN to minimize potential impact.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart