Command Injection Flaw in gluestack-ui Library by GlueStack
CVE-2025-53104

9.1CRITICAL

Key Information:

Vendor

Gluestack

Vendor
CVE Published:
1 July 2025

What is CVE-2025-53104?

A command injection vulnerability was identified in the gluestack-ui library's GitHub Actions workflow, specifically in the discussion-to-slack.yml configuration. This flaw allows untrusted user input, from fields like discussion titles and bodies, to be interpolated into shell commands. Malicious actors could exploit this by crafting targeted GitHub Discussion content to execute arbitrary commands on the Actions runner, leading to potential unauthorized access or control. The issue has since been mitigated by the removal of the vulnerable workflow in commit e6b4271, and users are advised to delete the discussion-to-slack.yml workflow if they utilize any forks or derivatives of this repository.

Affected Version(s)

gluestack-ui < e6b4271

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.