Remote Code Execution Vulnerability in tj-actions changed-files by GitHub
CVE-2025-30066
Key Information:
- Vendor
- Tj-actions
- Status
- Changed-files
- Vendor
- CVE Published:
- 15 March 2025
Badges
What is CVE-2025-30066?
CVE-2025-30066 is a remote code execution vulnerability affecting the tj-actions changed-files GitHub Action, which is employed to manage file changes in workflows on GitHub. This vulnerability allows attackers to exploit actions logs to access sensitive information or secrets, undermining the security of projects utilizing this action. The risk of unauthorized access could jeopardize the integrity and confidentiality of an organization’s codebase and sensitive data, making it essential for developers to ensure their use of tj-actions changed-files is within safe parameters.
Technical Details
The vulnerability arises from a modification to the tj-actions changed-files action, versions 1 through 45.0.7, which were previously secure but were manipulated by a threat actor to redirect to a malicious commit. This alteration enabled the reading of action logs by remote attackers, effectively exposing secrets that should remain confidential. Organizations utilizing affected versions should be aware of the specific commit that introduced the vulnerability and take immediate actions to mitigate the associated risks.
Potential impact of CVE-2025-30066
-
Exploitation of Sensitive Data: The primary impact of this vulnerability is the potential exposure of sensitive data such as API keys, credentials, or other secrets embedded in action logs, making it easier for malicious actors to conduct further attacks.
-
Supply Chain Risks: By compromising the tj-actions changed-files action, attackers can jeopardize the integrity of the software supply chain, posing risks to any dependent projects and opening doors for broader exploitation across interconnected systems.
-
Reputation Damage and Financial Loss: Organizations affected by the exploitation of this vulnerability may experience significant damage to their reputation, resulting in loss of customer trust, along with potential financial repercussions due to data breaches or compliance issues.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
changed-files 1 < 46
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation
1 week ago

CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise
CISA warns of CVE-2025-30066, a GitHub supply chain attack exposing secrets via compromised actions logs. Update tj-actions/changed-files by April 4.
1 week ago
References
EPSS Score
66% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 📈
Vulnerability started trending
- 📰
First article discovered by The Hacker News
- 👾
Exploit known to exist
- 🦅
CISA Reported
Vulnerability published
Vulnerability Reserved