CVE-2025-47775

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-47775
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-47775.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-47775
Aliases
Published
2025-05-14T15:18:37.058Z
Modified
2025-11-28T02:34:39.425570Z
Severity
  • 6.2 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Bullfrog's DNS over TCP bypasses domain filtering
Details

Bullfrog is a GithHb Action to block unauthorized outbound traffic in GitHub workflows. Prior to version 0.8.4, using tcp breaks blocking and allows DNS exfiltration. This can result in sandbox bypass. Version 0.8.4 fixes the issue.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/47xxx/CVE-2025-47775.json",
    "cwe_ids": [
        "CWE-201"
    ]
}
References

Affected packages

Git / github.com/bullfrogsec/bullfrog

Affected ranges

Type
GIT
Repo
https://github.com/bullfrogsec/bullfrog
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed