CVE-2025-30154

CVSS v3 Score
8.6
High

Vulnerability Description

reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs. Other reviewdog actions that use `reviewdog/action-setup@v1` that would also be compromised, regardless of version or pinning method, are reviewdog/action-shellcheck, reviewdog/action-composite-template, reviewdog/action-staticcheck, reviewdog/action-ast-grep, and reviewdog/action-typos.

CVSS:8.6(High)

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modifi...

CVSS:8.4(High)

Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vuln...

CVSS:9.1(Critical)

Version 1.1.6-free of Chameleon Mini Live Debugger on Google Play Store may have had it's sources or permissions tampered by a malicious actor. The official maintainer of the package is recommending a...

CVSS:7.5(High)

`d3.js` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.

CVSS:7.5(High)

`jquery.js` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.

CVSS:7.5(High)

`mariadb` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.