Miggo Logo

CVE-2025-47271: OZI-Project/ozi-publish Code Injection vulnerability

6.3

CVSS Score
4.0

Basic Information

EPSS Score
0.19773%
Published
5/12/2025
Updated
5/12/2025
KEV Status
No
Technology
TechnologyGitHub Actions

Technical Details

CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Package NameEcosystemVulnerable VersionsFirst Patched Version
OZI-Project/publishactions>= 1.13.2, < 1.13.61.13.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in a GitHub Action defined in action.yml. Specifically, the 'Create pull request' step used a run command that directly interpolated GitHub context variables (like branch names) and inputs into a gh pr create shell command. The patch changes this to use environment variables, which is a standard mitigation for command injection in shell scripts. The vulnerable 'function' is considered to be the execution of this named step, as its run script contained the flawed command construction. A runtime profiler or logs for GitHub Actions would likely identify execution units by their step names. The patch diff clearly shows the removal of the vulnerable command string and its replacement with a safer method using environment variables.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Pot*nti*lly untrust** **t* *lows into PR *r**tion lo*i*. * m*li*ious **tor *oul* *onstru*t * *r*n** n*m* t**t inj**ts *r*itr*ry *o**. ### P*t***s T*is is p*t**** in *.**.* ### Work*roun*s *own*r*** to <*.**.* ### R***r*n**s * [Un**rst*

Reasoning

T** vuln*r**ility li*s in * *it*u* **tion ***in** in `**tion.yml`. Sp**i*i**lly, t** '*r**t* pull r*qu*st' st*p us** * `run` *omm*n* t**t *ir**tly int*rpol*t** *it*u* *ont*xt v*ri**l*s (lik* *r*n** n*m*s) *n* inputs into * `** pr *r**t*` s**ll *omm*n