CVE-2025-47271

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-47271
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-47271.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-47271
Aliases
Published
2025-05-12T11:15:51Z
Modified
2025-05-17T14:08:21.400955Z
Summary
[none]
Details

The OZI action is a GitHub Action that publishes releases to PyPI and mirror releases, signature bundles, and provenance in a tagged release. In versions 1.13.2 through 1.13.5, potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. This is patched in 1.13.6. As a workaround, one may downgrade to a version prior to 1.13.2.

References

Affected packages

Git / github.com/ozi-project/publish

Affected ranges

Type
GIT
Repo
https://github.com/ozi-project/publish
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1.0
0.1.1
0.1.10
0.1.11
0.1.2
0.1.3
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8
0.1.9

1.*

1.0.0
1.0.1
1.0.2
1.1.0
1.10.0
1.10.1
1.12.0
1.13.0
1.13.1
1.13.2
1.13.3
1.13.4
1.13.5
1.2.0
1.2.1
1.2.2
1.3.0
1.3.1
1.4.0
1.4.1
1.5.0
1.6.0
1.7.0
1.7.1
1.7.2
1.7.3
1.8.0
1.9.0
1.9.1
1.9.2
1.9.3