This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: `tj-actions/changed-files` (v46 and below) contains malicious code. π **Consequences**: Attackers can read operation logs to steal secrets.β¦
π‘οΈ **Root Cause**: CWE-506 (Software Fault Injection). The flaw is intentional malicious code embedded in the action that dumps memory content to the app, exposing secrets.
Q3Who is affected? (Versions/Components)
π₯ **Affected**: Users of `tj-actions/changed-files` GitHub Action. Specifically versions **before v46**. The vendor is `tj-actions`.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: Remote attackers can access operation logs. They can extract **secrets** (API keys, tokens) that were previously exposed to logs due to the vulnerability.
Q5Is exploitation threshold high? (Auth/Config)
π **Exploitation Threshold**: **Low**. CVSS Vector: `AV:N/AC:L/PR:N/UI:N`. No authentication, no user interaction, and network-accessible. Very easy to exploit.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp/PoC**: Yes. A test repo exists (`OS-pedrogustavobilro/test-changed-files`) and a detection tool (`Checkmarx-CVE-2025-30066-Detection-Tool`) is available to scan for risky actions and exposed secrets.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Use the **Checkmarx Detection Tool** to scan GitHub workflows. Look for specific risky actions (`reviewdog/*`) and suspicious code snippets. Check logs for memory dumps.
Q8Is it fixed officially? (Patch/Mitigation)
β **Official Fix**: Yes. The issue is tracked in GitHub Issue #2464. The malicious code has been removed. **Update to v46 or later** to mitigate.
Q9What if no patch? (Workaround)
π§ **No Patch Workaround**: If you cannot update immediately, **audit your workflow logs** for exposed secrets. Rotate any potentially compromised credentials immediately. Remove the vulnerable action version.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. High severity (C:H), low exploitation barrier. Immediate patching to v46+ and secret rotation is required to prevent data leakage.