Home

Description

dag-factory is a library for Apache Airflow® to construct DAGs declaratively via configuration files. In versions 0.23.0a8 and below, a high-severity vulnerability has been identified in the cicd.yml workflow within the astronomer/dag-factory GitHub repository. The workflow, specifically when triggered by pull_request_target, is susceptible to exploitation, allowing an attacker to execute arbitrary code within the GitHub Actions runner environment. This misconfiguration enables an attacker to establish a reverse shell, exfiltrate sensitive secrets, including the highly-privileged GITHUB_TOKEN, and ultimately gain full control over the repository. This is fixed in version 0.23.0a9.

PUBLISHED Reserved 2025-07-21 | Published 2025-07-26 | Updated 2025-07-28 | Assigner GitHub_M




CRITICAL: 9.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

< 0.23.0a9
affected

References

github.com/...actory/security/advisories/GHSA-g5hx-xv45-9whg

github.com/astronomer/dag-factory/pull/460

github.com/astronomer/dag-factory/pull/466

github.com/...ommit/751c0e58369e784f6a924347e381a705ea8133fe

cve.org (CVE-2025-54415)

nvd.nist.gov (CVE-2025-54415)