We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-31484

conda-forge infrastructure uses a bad token for Azure's cf-staging access



Description

conda-forge infrastructure holds common configurations and settings for key pieces of the conda-forge infrastructure. Between 2025-02-10 and 2025-04-01, conda-forge infrastructure used the wrong token for Azure's cf-staging access. This bug meant that any feedstock maintainer could upload a package to the conda-forge channel, bypassing our feedstock-token + upload process. The security logs on anaconda.org were check for any packages that were not copied from the cf-staging to the conda-forge channel and none were found.

Reserved 2025-03-28 | Published 2025-04-02 | Updated 2025-04-03 | Assigner GitHub_M


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-284: Improper Access Control

Product status

>= 2025-02-10, <= 2025-04-01
affected

References

github.com/...ucture/security/advisories/GHSA-m4h2-49xf-vq72

github.com/...ommit/70f3f09e64968d5f0a7b0525846f17cad42dd052

cve.org (CVE-2025-31484)

nvd.nist.gov (CVE-2025-31484)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-31484

Support options

Helpdesk Chat, Email, Knowledgebase