CVE-2025-30154
Reviewdog
CVE-2025-30154 is a critical security vulnerability affecting the reviewdog/action-setup GitHub action. Malicious code was injected into reviewdog/action-setup@v1, resulting in the exposure of sensitive secrets within GitHub Actions Workflow Logs. This compromise impacts other reviewdog actions relying on the affected version, including reviewdog/action-shellcheck and others, regardless of their specific versions or pinning methods. The
With an SVRS score of 75, this vulnerability poses a significant risk, indicating a high likelihood of exploitation and potential for widespread damage. The exposure of secrets can lead to unauthorized access, data breaches, and compromise of systems relying on those credentials. Given active exploits are available, immediate action is recommended to mitigate this supply chain risk by auditing and patching vulnerable workflows.
Description
CVE-2025-30154 details a supply chain compromise affecting the reviewdog/action-setup@v1
GitHub action. Malicious code was injected into the action between 18:42 and 20:31 UTC on March 11, 2025, resulting in the unauthorized exposure of secrets to GitHub Actions Workflow Logs. This impacts not only reviewdog/action-setup@v1
but also other reviewdog actions that utilize it, such as reviewdog/action-shellcheck
, reviewdog/action-composite-template
, reviewdog/action-staticcheck
, reviewdog/action-ast-grep
, and reviewdog/action-typos
. Although the CVSS score is 8.6, the SOCRadar Vulnerability Risk Score (SVRS) of 78 indicates a substantial risk, nearing the critical threshold, requiring careful assessment and mitigation despite not reaching the critical threshold of 80. Active exploits have been published to exploit the vulnerability and the vulnerability is actively exploited by hackers. The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability.
Key Insights
- Supply Chain Vulnerability: This CVE highlights the significant risk associated with supply chain attacks targeting widely used GitHub Actions. Even seemingly trusted actions can be compromised, leading to widespread security breaches.
- Secret Exposure: The injected malicious code specifically targets the exposure of sensitive secrets within GitHub Actions Workflow Logs. This could include API keys, passwords, and other credentials, potentially allowing attackers to gain unauthorized access to critical systems and data.
- Broad Impact: The compromise extends beyond the immediate
reviewdog/action-setup@v1
action, affecting multiple other reviewdog actions that depend on it. This emphasizes the importance of understanding dependencies and potential cascading effects in software supply chains. - Active Exploitation and CISA Warning: The fact that the vulnerability is actively exploited by hackers, combined with the fact that active exploits have been published and that CISA has issued a warning, underscores the urgency of addressing this issue. Immediate action is crucial to prevent further exploitation and mitigate potential damage.
Mitigation Strategies
- Review and Audit GitHub Actions: Thoroughly review all GitHub Actions used in repositories, paying close attention to the origin and trustworthiness of each action. Implement strict controls over which actions are allowed and regularly audit their configurations.
- Implement Secret Management Best Practices: Avoid storing secrets directly in code or configuration files. Utilize secure secret management solutions provided by GitHub or third-party vendors. Regularly rotate secrets and monitor for any signs of unauthorized access or exposure.
- Pin Action Versions and Use Checksums: When using GitHub Actions, pin specific versions to prevent unexpected updates that could introduce vulnerabilities. Additionally, use checksums to verify the integrity of the actions being used.
- Scan Action Usage and Monitor for Compromises: Utilize tools to scan repositories for usage of compromised actions like
reviewdog/action-setup@v1
and its dependencies. Monitor security advisories and threat intelligence feeds for emerging threats targeting GitHub Actions.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.