The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used third-party GitHub Action: tj-actions/changed-files.
This action, exploited under CVE-2025-30066, is designed to identify changes in files during pull requests or commits.
However, its compromise poses a significant risk to users by allowing unauthorized access to sensitive information, including access keys, GitHub Personal Access Tokens (PATs), npm tokens, and private RSA keys.
The vulnerability was deemed severe enough for CISA to add CVE-2025-30066 to its Known Exploited Vulnerabilities Catalog.
The agency is urging users to update their GitHub Actions to at least version 46.0.1 to mitigate the issue.
The compromise highlights the growing concern of supply-chain attacks, where targeting a single component can have far-reaching consequences across hundreds or thousands of organizations using the affected software.
CISA emphasizes the importance of implementing robust security measures when using third-party actions.
This includes vigilance in monitoring logs for any signs of unauthorized access and ensuring that all software components are kept up-to-date with the latest security patches.
CISA provides several resources for organizations to address this vulnerability effectively:
This support ensures prompt action can be taken to protect against further exploitation.
The compromise of tj-actions/changed-files serves as a stark reminder of the importance of maintaining robust security practices in software development and deployment.
As the digital landscape continues to evolve, vigilance against such vulnerabilities is crucial for protecting sensitive information and maintaining trust in software supply chains.
Users must remain proactive in updating their systems and adhering to best security practices to safeguard against emerging threats.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to deceive…
California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted by…
Cloudflare, a leading web infrastructure and security company, has launched the Cloudforce One threat events…
A threat intelligence researcher from Cato CTRL, part of Cato Networks, has successfully exploited a…
Hackers are exploiting a vulnerability in Microsoft's Azure App Proxy by manipulating the pre-authentication settings…
A recent cybersecurity incident has highlighted the sophisticated methods used by hackers to target web…