CVE-2025-31479

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-31479
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-31479.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-31479
Aliases
Published
2025-04-02T22:15:20Z
Modified
2025-04-03T08:49:03.596920Z
Summary
[none]
Details

canonical/get-workflow-version-action is a GitHub composite action to get commit SHA that GitHub Actions reusable workflow was called with. Prior to 1.0.1, if the get-workflow-version-action step fails, the exception output may include the GITHUBTOKEN. If the full token is included in the exception output, GitHub will automatically redact the secret from the GitHub Actions logs. However, the token may be truncated—causing part of the GITHUBTOKEN to be displayed in plaintext in the GitHub Actions logs. Anyone with read access to the GitHub repository can view GitHub Actions logs. For public repositories, anyone can view the GitHub Actions logs. The opportunity to exploit this vulnerability is limited—the GITHUBTOKEN is automatically revoked when the job completes. However, there is an opportunity for an attack in the time between the GITHUBTOKEN being displayed in the logs and the completion of the job. Users using the github-token input are impacted. This vulnerability is fixed in 1.0.1.

References

Affected packages

Git / github.com/canonical/get-workflow-version-action

Affected ranges

Type
GIT
Repo
https://github.com/canonical/get-workflow-version-action
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0