CVE-2025-32953

8.7 HIGH

📋 TL;DR

This vulnerability in z80pack's GitHub Actions workflow exposes the repository's GITHUB_TOKEN in publicly accessible build artifacts. Attackers who download the artifact during a brief window can extract the token and use it to push malicious code or modify releases. Only users running z80pack version 1.38 or earlier from affected GitHub workflows are impacted.

💻 Affected Systems

Products:
  • z80pack
Versions: 1.38 and prior
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GitHub Actions workflows using the vulnerable makefile-ubuntu.yml; local installations are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains write access to the repository, allowing them to push malicious commits, modify releases, or inject backdoors into the codebase.

🟠

Likely Case

Unauthorized code modifications or release tampering if an attacker monitors workflow runs and downloads artifacts during the vulnerable window.

🟢

If Mitigated

No impact if the workflow is fixed or artifacts are not publicly accessible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires monitoring GitHub Actions runs and downloading artifacts during the brief exposure window.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit bd95916

Vendor Advisory: https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q

Restart Required: No

Instructions:

1. Update to the latest z80pack version. 2. Ensure GitHub Actions workflows exclude .git/config from artifacts. 3. Review and rotate any exposed GITHUB_TOKENs.

🔧 Temporary Workarounds

Modify GitHub Actions Workflow

all

Update the workflow to exclude .git/config from uploaded artifacts or use artifact retention policies.

Modify makefile-ubuntu.yml to add: paths: - '!**/.git/config'

🧯 If You Can't Patch

  • Disable the vulnerable GitHub Actions workflow or make artifacts private.
  • Implement strict monitoring for unauthorized repository changes and rotate GITHUB_TOKENs regularly.

🔍 How to Verify

Check if Vulnerable:

Inspect the makefile-ubuntu.yml workflow file for use of actions/upload-artifact@v4 without excluding .git/config.

Check Version:

Check the repository commit history for inclusion of commit bd95916.

Verify Fix Applied:

Confirm the workflow no longer includes .git/config in artifacts and uses updated artifact upload practices.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized commits or pushes in GitHub audit logs
  • Unexpected artifact downloads from GitHub Actions

Network Indicators:

  • Unusual API calls to GitHub from unexpected IPs using repository tokens

SIEM Query:

source="github" AND (event="push" OR event="release") AND actor NOT IN [expected_users]

🔗 References

📤 Share & Export