Home

Description

serverless-dns is a RethinkDNS resolver that deploys to Cloudflare Workers, Deno Deploy, Fastly, and Fly.io. Versions through abd including 0.1.30 have a vulnerability where the pr.yml GitHub Action interpolates in an unsafe manner untrusted input, specifically the github.event.pull_request.head.repo.clone_url and github.head_ref, to a command in the runner. Due to the action using the pull_request_target trigger it has permissive permissions by default. An unauthorized attacker can exploit this vulnerability to push arbitrary data to the repository. The subsequent impact on the end-user is executing the attackers' code when running serverless-dns. This is fixed in commit c5537dd, and expected to be released in 0.1.31.

PUBLISHED Reserved 2025-09-26 | Published 2025-09-30 | Updated 2025-09-30 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

< 0.1.31
affected

References

github.com/...ss-dns/security/advisories/GHSA-9g7x-737f-5xpc

github.com/...ommit/c5537dd7f203c59f2b86d1e295c2371f3533946a

cve.org (CVE-2025-61584)

nvd.nist.gov (CVE-2025-61584)

Download JSON