We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52467

pgai secrets exfiltration via `pull_request_target`



Description

pgai is a Python library that transforms PostgreSQL into a retrieval engine for RAG and Agentic applications. Prior to commit 8eb3567, the pgai repository was vulnerable to an attack allowing the exfiltration of all secrets used in one workflow. In particular, the GITHUB_TOKEN with write permissions for the repository, allowing an attacker to tamper with all aspects of the repository, including pushing arbitrary code and releases. This issue has been patched in commit 8eb3567.

Reserved 2025-06-17 | Published 2025-06-19 | Updated 2025-06-19 | Assigner GitHub_M


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 8eb356729c33560ce54b88b9a956960ad1e3ede8
affected

References

github.com/...e/pgai/security/advisories/GHSA-89qq-hgvp-x37m

github.com/timescale/pgai/pull/742

github.com/...ommit/8eb356729c33560ce54b88b9a956960ad1e3ede8

cve.org (CVE-2025-52467)

nvd.nist.gov (CVE-2025-52467)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52467

Support options

Helpdesk Chat, Email, Knowledgebase