GHSA-33f4-mjch-7fpr

Suggest an improvement
Source
https://github.com/advisories/GHSA-33f4-mjch-7fpr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-33f4-mjch-7fpr/GHSA-33f4-mjch-7fpr.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-33f4-mjch-7fpr
Aliases
Published
2025-10-10T22:53:42Z
Modified
2025-10-23T20:35:27Z
Severity
  • 4.6 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
Allstar Reviewbot has Authentication Bypass via Hard-coded Webhook Secret
Details

A vulnerability in Allstar’s Reviewbot component caused inbound webhook requests to be validated against a hard-coded, shared secret:

https://github.com/ossf/allstar/blob/294ae985cc2facd0918e8d820e4196021aa0b914/pkg/reviewbot/reviewbot.go#L59

The value used for the secret token was compiled into the Allstar binary and could not be configured at runtime. In practice, this meant that every deployment using Reviewbot would validate requests with the same secret unless the operator modified source code and rebuilt the component - an expectation that is not documented and is easy to miss. While Reviewbot is not commonly enabled in standard Allstar setups, we are issuing this advisory to reach any environments where it may have been deployed.

Affected Versions

All Allstar releases prior to v4.5 that include the Reviewbot code path are affected. Deployments on v4.5 and later are not affected. If you have not enabled or exposed the Reviewbot endpoint, this issue does not apply to your installation.

Impact

If the Reviewbot endpoint is deployed and reachable, an attacker can bypass authentication by crafting webhook requests that use the known, hard-coded secret. Because signature verification will succeed, Reviewbot would treat these requests as authentic when they should be rejected. Depending on the permissions and automations attached to your deployment, this could allow unauthorized triggering of review actions such as posting automated comments or reviews, influencing checks, or otherwise manipulating repository signals. The primary risk is to the integrity of repository workflows rather than confidentiality or availability, although secondary effects (e.g., noisy automation, misleading reviews, or workflow disruptions) are possible.

Exploitability

Exploiting this is straightforward and does not require an attacker to be authenticated. Anyone who can send requests to the Reviewbot webhook can reach the vulnerable code.

Database specific
{
    "cwe_ids": [
        "CWE-798"
    ],
    "github_reviewed": true,
    "nvd_published_at": "2025-10-09T22:15:32Z",
    "github_reviewed_at": "2025-10-10T22:53:42Z",
    "severity": "MODERATE"
}
References

Affected packages

Go / github.com/ossf/allstar

Package

Name
github.com/ossf/allstar
View open source insights on deps.dev
Purl
pkg:golang/github.com/ossf/allstar

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20250721181116-e004ecb540d6