We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32953

z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact



Description

z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.

Reserved 2025-04-14 | Published 2025-04-18 | Updated 2025-04-21 | Assigner GitHub_M


HIGH: 8.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< bd95916
affected

References

github.com/...80pack/security/advisories/GHSA-gpjj-f76m-9x3q

github.com/...ommit/1e06c2fe498ca772002b5c4f6f9e3085061e47da

github.com/...ommit/836c2e37b54f86bb4bed9e1406b67e52aa52308d

github.com/...ommit/95535987d690bd20849fbf143f267283f0e2db91

github.com/...ommit/bd9591615ae7b1e6229aa60a485447441c4a0c15

cve.org (CVE-2025-32953)

nvd.nist.gov (CVE-2025-32953)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32953

Support options

Helpdesk Chat, Email, Knowledgebase