First published: Sat Mar 15 2025(Updated: )
The tj-actions/changed-files GitHub Action contains an embedded malicious code vulnerability that allows a remote attacker to discover secrets by reading actions logs. These secrets may include, but are not limited to, valid AWS access keys, GitHub personal access tokens (PATs), npm tokens, and private RSA keys.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
tj-action/changed-files | <=45.0.7 | |
actions/tj-actions/changed-files | <=45.0.7 | 46.0.1 |
tj-actions changed-files |
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-30066 is high due to its potential to expose sensitive information through action logs.
To fix CVE-2025-30066, upgrade tj-actions changed-files to version 45.0.8 or later.
CVE-2025-30066 affects users of tj-actions changed-files version 45.0.7 and earlier.
CVE-2025-30066 is a security vulnerability that allows remote attackers to discover secrets via actions logs.
Users should review their actions logs for potential exposure of sensitive information and upgrade their tj-actions changed-files installation.