First published: Mon Apr 21 2025(Updated: )
Adept is a language for general purpose programming. Prior to commit a1a41b7, the remoteBuild.yml workflow file uses actions/upload-artifact@v4 to upload the mac-standalone artifact. This artifact is a zip of the current directory, which includes the automatically generated .git/config file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in the AdeptLanguage/Adept repository. This issue has been patched in commit a1a41b7.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adept Language | <commit a1a41b7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32958 is considered a medium severity vulnerability due to potential information exposure.
To fix CVE-2025-32958, update your Adept Language to a version after commit a1a41b7.
CVE-2025-32958 is a vulnerability that involves the insecure handling of artifacts in the remote build workflow.
Versions of Adept Language up to but not including commit a1a41b7 are affected by CVE-2025-32958.
The consequences of CVE-2025-32958 may include unauthorized access to sensitive information in the included artifacts.