We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53104

gluestack-ui Command Injection Vulnerability via discussion-to-slack GitHub Action Workflow



Description

gluestack-ui is a library of copy-pasteable components & patterns crafted with Tailwind CSS (NativeWind). Prior to commit e6b4271, a command injection vulnerability was discovered in the discussion-to-slack.yml GitHub Actions workflow. Untrusted discussion fields (title, body, etc.) were directly interpolated into shell commands in a run: block. An attacker could craft a malicious GitHub Discussion title or body (e.g., $(curl ...)) to execute arbitrary shell commands on the Actions runner. This issue has been fixed in commit e6b4271 where the discussion-to-slack.yml workflow was removed. Users should remove the discussion-to-slack.yml workflow if using a fork or derivative of this repository.

Reserved 2025-06-25 | Published 2025-07-01 | Updated 2025-07-01 | Assigner GitHub_M


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

< e6b4271
affected

References

github.com/...ack-ui/security/advisories/GHSA-432r-9455-7f9x

github.com/...ommit/e6b427150b35e97a089ea10409de8c5c52f8a7b9

cve.org (CVE-2025-53104)

nvd.nist.gov (CVE-2025-53104)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53104

Support options

Helpdesk Chat, Email, Knowledgebase