CVE-2025-47271 – ozi-project/publish
Package
Manager: github_actions
Name: ozi-project/publish
Vulnerable Version: >=1.13.2 <1.13.6
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
EPSS: 0.00073 pctl0.22694
Details
OZI-Project/ozi-publish Code Injection vulnerability ### Impact Potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. ### Patches This is patched in 1.13.6 ### Workarounds Downgrade to <1.13.2 ### References * [Understanding the Risk of Script Injections](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#understanding-the-risk-of-script-injections)
Metadata
Created: 2025-05-12T19:58:07Z
Modified: 2025-05-12T19:58:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-2487-9f55-2vg9/GHSA-2487-9f55-2vg9.json
CWE IDs: ["CWE-1116", "CWE-94", "CWE-95"]
Alternative ID: GHSA-2487-9f55-2vg9
Finding: F184
Auto approve: 1