Arbitrary Code Execution Vulnerability in RethinkDNS Resolver by Serverless-DNS
CVE-2025-61584
9.3CRITICAL
What is CVE-2025-61584?
The RethinkDNS resolver from Serverless-DNS contains a vulnerability due to unsafe interpolation of untrusted input in its GitHub Action. Specifically, when using the pull_request_target trigger, the action inherits permissive permissions, allowing unauthorized attackers to exploit this flaw. This risk enables malicious actors to push arbitrary code to the repository and execute it when the Serverless-DNS action runs. A fix has been implemented in commit c5537dd and is expected to be available in version 0.1.31.
Affected Version(s)
serverless-dns < 0.1.31