Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-30066 β€” AI Deep Analysis Summary

CVSS 8.6 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: `tj-actions/changed-files` (v46 and below) contains malicious code. πŸ“‰ **Consequences**: Attackers can read operation logs to steal secrets.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-506 (Software Fault Injection). The flaw is intentional malicious code embedded in the action that dumps memory content to the app, exposing secrets.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users of `tj-actions/changed-files` GitHub Action. Specifically versions **before v46**. The vendor is `tj-actions`.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Remote attackers can access operation logs. They can extract **secrets** (API keys, tokens) that were previously exposed to logs due to the vulnerability.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **Low**. CVSS Vector: `AV:N/AC:L/PR:N/UI:N`. No authentication, no user interaction, and network-accessible. Very easy to exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exp/PoC**: Yes. A test repo exists (`OS-pedrogustavobilro/test-changed-files`) and a detection tool (`Checkmarx-CVE-2025-30066-Detection-Tool`) is available to scan for risky actions and exposed secrets.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Use the **Checkmarx Detection Tool** to scan GitHub workflows. Look for specific risky actions (`reviewdog/*`) and suspicious code snippets. Check logs for memory dumps.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: Yes. The issue is tracked in GitHub Issue #2464. The malicious code has been removed. **Update to v46 or later** to mitigate.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: If you cannot update immediately, **audit your workflow logs** for exposed secrets. Rotate any potentially compromised credentials immediately. Remove the vulnerable action version.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. High severity (C:H), low exploitation barrier. Immediate patching to v46+ and secret rotation is required to prevent data leakage.