CVE-2025-61584

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-61584
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-61584.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-61584
Aliases
  • GHSA-9g7x-737f-5xpc
Published
2025-09-30T00:12:23.873Z
Modified
2025-12-02T20:16:06.304035Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P CVSS Calculator
Summary
serverless-dns is vulnerable to Command Injection through pr.yml GitHub Action Workflow
Details

serverless-dns is a RethinkDNS resolver that deploys to Cloudflare Workers, Deno Deploy, Fastly, and Fly.io. Versions through abd including 0.1.30 have a vulnerability where the pr.yml GitHub Action interpolates in an unsafe manner untrusted input, specifically the github.event.pullrequest.head.repo.cloneurl and github.headref, to a command in the runner. Due to the action using the pullrequest_target trigger it has permissive permissions by default. An unauthorized attacker can exploit this vulnerability to push arbitrary data to the repository. The subsequent impact on the end-user is executing the attackers' code when running serverless-dns. This is fixed in commit c5537dd, and expected to be released in 0.1.31.

Database specific
{
    "cwe_ids": [
        "CWE-77"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/61xxx/CVE-2025-61584.json"
}
References

Affected packages

Git / github.com/serverless-dns/serverless-dns

Affected ranges

Type
GIT
Repo
https://github.com/serverless-dns/serverless-dns
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

list
show

v0.*

v0.1
v0.1.1
v0.1.10
v0.1.11
v0.1.12
v0.1.13
v0.1.14
v0.1.15
v0.1.16
v0.1.17
v0.1.18
v0.1.19
v0.1.2
v0.1.20
v0.1.21
v0.1.22
v0.1.23
v0.1.24
v0.1.25
v0.1.3
v0.1.30
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.1.9

v1.*

v1.4.9