Skip to content

Critical command injection vulnerability in GitHub actions workflow

Critical
mrubens published GHSA-xr6r-vj48-29f6 Sep 4, 2025 · 1 comment

Package

No package listed

Affected versions

Commits prior to a0384f3

Patched versions

Commit a0384f3

Description

Summary

A critical command injection vulnerability was discovered in the discord-pr-notify.yml GitHub Actions workflow of the RooCodeInc/Roo-Code repository. The workflow used unsanitized pull request metadata in a privileged context, allowing an attacker to craft malicious input and achieve Remote Code Execution (RCE) on the Actions runner.

Impact

The vulnerability’s impact is severe due to the workflow running with broad permissions and access to repository secrets. An attacker could:

  • Execute arbitrary commands on the runner.
  • Push or modify code in the repository.
  • Access sensitive secrets, such as webhook credentials.
  • Create malicious releases or packages.

This could result in a complete compromise of the repository and its associated services.

Resolution

The vulnerable workflow has been removed, and all affected secrets have been rotated.

@yaronav
Copy link
Author

yaronav commented Sep 4, 2025

Severity

Critical

CVE ID

CVE-2025-58371

Weaknesses

No CWEs

Credits