We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54415

dag-factory's CI/CD Workflow Allows for Repository Takeover and Secret Exfiltration



Description

dag-factory is a library for Apache Airflow® to construct DAGs declaratively via configuration files. In versions 0.23.0a8 and below, a high-severity vulnerability has been identified in the cicd.yml workflow within the astronomer/dag-factory GitHub repository. The workflow, specifically when triggered by pull_request_target, is susceptible to exploitation, allowing an attacker to execute arbitrary code within the GitHub Actions runner environment. This misconfiguration enables an attacker to establish a reverse shell, exfiltrate sensitive secrets, including the highly-privileged GITHUB_TOKEN, and ultimately gain full control over the repository. This is fixed in version 0.23.0a9.

Reserved 2025-07-21 | Published 2025-07-26 | Updated 2025-07-26 | Assigner GitHub_M


CRITICAL: 9.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

< 0.23.0a9
affected

References

github.com/...actory/security/advisories/GHSA-g5hx-xv45-9whg

github.com/astronomer/dag-factory/pull/460

github.com/astronomer/dag-factory/pull/466

github.com/...ommit/751c0e58369e784f6a924347e381a705ea8133fe

cve.org (CVE-2025-54415)

nvd.nist.gov (CVE-2025-54415)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54415

Support options

Helpdesk Chat, Email, Knowledgebase