GHSA-65RG-554R-9J5X
Vulnerability from github – Published: 2025-08-28 14:40 – Updated: 2025-08-28 15:59
VLAI?
Summary
lychee link checking action affected by arbitrary code injection in composite action
Details
Summary
There is a potential attack of arbitrary code injection vulnerability in lychee-setup of the composite action at action.yml.
Details
The GitHub Action variable inputs.lycheeVersion can be used to execute arbitrary code in the context of the action.
PoC
- uses: lycheeverse/lychee@v2
with:
lycheeVersion: $(printenv >> $GITHUB_STEP_SUMMARY && echo "v0.16.1")
The previous example will just print all the environment variables to the summary of the workflow, but an attacker could potentially use this vector to compromise the security of the target repository, even passing unnotice because the action will run normally.
Impact
Low
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "GitHub Actions",
"name": "lycheeverse/lychee-action"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.0.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-48908"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": true,
"github_reviewed_at": "2025-08-28T14:40:08Z",
"nvd_published_at": "2025-08-28T15:15:42Z",
"severity": "MODERATE"
},
"details": "### Summary\n\nThere is a potential attack of arbitrary code injection vulnerability in `lychee-setup` of the composite action at *action.yml*.\n\n### Details\n\nThe GitHub Action variable `inputs.lycheeVersion` can be used to execute arbitrary code in the context of the action.\n\n### PoC\n\n```yaml\n- uses: lycheeverse/lychee@v2\n with:\n lycheeVersion: $(printenv \u003e\u003e $GITHUB_STEP_SUMMARY \u0026\u0026 echo \"v0.16.1\")\n```\n\nThe previous example will just print all the environment variables to the summary of the workflow, but an attacker could potentially use this vector to compromise the security of the target repository, even passing unnotice because the action will run normally.\n\n### Impact\n\nLow",
"id": "GHSA-65rg-554r-9j5x",
"modified": "2025-08-28T15:59:37Z",
"published": "2025-08-28T14:40:08Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/lycheeverse/lychee-action/security/advisories/GHSA-65rg-554r-9j5x"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48908"
},
{
"type": "WEB",
"url": "https://github.com/lycheeverse/lychee-action/commit/7cd0af4c74a61395d455af97419279d86aafaede"
},
{
"type": "PACKAGE",
"url": "https://github.com/lycheeverse/lychee-action"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U",
"type": "CVSS_V4"
}
],
"summary": "lychee link checking action affected by arbitrary code injection in composite action"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…