CVE-2025-30066

HIGH CISA KEV

CVSS v3

8.6

HIGH

EPSS Score

exploit probability

CISA KEV

Yes

known exploited

Exploitation

SSVC status

Description

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

CISA Known Exploited Vulnerability

Date Added
3/18/2025
Patch Due Date
4/8/2025
Required Action
Apply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Technical Details

CVSS v3 Vector
3.1
Published
3/15/2025
Last Modified
11/5/2025

Frequently Asked Questions

What is CVE-2025-30066?

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

Is CVE-2025-30066 actively exploited?

Yes. CVE-2025-30066 is on the CISA Known Exploited Vulnerabilities (KEV) catalog, meaning it has been confirmed as actively exploited in the wild. CISA requires federal agencies to patch by 4/8/2025.

What is the CVSS score for CVE-2025-30066?

CVE-2025-30066 has a CVSS v3 base score of 8.6 (HIGH severity), with vector string 3.1.

Is CVE-2025-30066 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.