Arbitrary Command Execution Vulnerability in tj-actions/branch-names GitHub Action
CVE-2025-54416

9.1CRITICAL

Key Information:

Vendor

Tj-actions

Vendor
CVE Published:
26 July 2025

What is CVE-2025-54416?

CVE-2025-54416 is a critical vulnerability found in the tj-actions/branch-names GitHub Action, a tool designed to streamline workflows by enabling the retrieval of branch or tag names during various GitHub events. This vulnerability, present in versions up to 8.2.1, allows for arbitrary command execution within downstream workflows due to issues with inconsistent input sanitization and unescaped output. Malicious actors can exploit this flaw by crafting specific branch names or tags that trigger unintended command execution in systems utilizing this GitHub Action. Organizations relying on this tool are at significant risk, as the vulnerability facilitates unauthorized actions that could compromise sensitive data and disrupt operations.

Potential impact of CVE-2025-54416

  1. Arbitrary Command Execution: The primary impact of this vulnerability is the ability for attackers to execute arbitrary commands in the environments that utilize the affected GitHub Action. This could lead to malicious activities, including system compromise or data exfiltration.

  2. Security Risk to Downstream Workflows: The flaw can propagate risks to downstream workflows, where subsequent actions may be affected by the maliciously crafted inputs, potentially leading to broader vulnerabilities within the CI/CD pipeline and affecting overall security postures.

  3. Increased Attack Surface: By exploiting this vulnerability, threat actors can expand their foothold in an organization, leading to further exploitation of additional vulnerabilities and systems, which increases the overall attack surface and complicates detection and response efforts.

Affected Version(s)

branch-names < 9.0.0

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.