CVE-2025-54594 (CNNVD-202508-408)

CRITICAL
中文标题:
react-native-bottom-tabs 安全漏洞
英文标题:
react-native-bottom-tabs: Arbitrary code execution in GitHub Actions canary workflow leads to secret exfiltration
CVSS分数: 9.1
发布时间: 2025-08-05 23:31:53
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

react-native-bottom-tabs是Callstack Incubator开源的一个的原生底部标签。 react-native-bottom-tabs 0.9.2及之前版本存在安全漏洞,该漏洞源于GitHub Actions工作流使用不当的pull_request_target事件触发器,可能导致任意代码执行。

英文描述:

react-native-bottom-tabs is a library of Native Bottom Tabs for React Native. In versions 0.9.2 and below, the github/workflows/release-canary.yml GitHub Actions repository workflow improperly used the pull_request_target event trigger, which allowed for untrusted code from a forked pull request to be executed in a privileged context. An attacker could create a pull request containing a malicious preinstall script in the package.json file and then trigger the vulnerable workflow by posting a specific comment (!canary). This allowed for arbitrary code execution, leading to the exfiltration of sensitive secrets such as GITHUB_TOKEN and NPM_TOKEN, and could have allowed an attacker to push malicious code to the repository or publish compromised packages to the NPM registry. There is a remediation commit which removes github/workflows/release-canary.yml, but a version with this fix has yet to be released.

CWE类型:
CWE-94 CWE-269
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
callstackincubator react-native-bottom-tabs <= 0.9.2 - - cpe:2.3:a:callstackincubator:react-native-bottom-tabs:<=_0.9.2:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/callstackincubator/react-native-bottom-tabs/security/advisories/GHSA-588g-38p4-gr6x x_refsource_CONFIRM
cve.org
访问
https://github.com/callstackincubator/react-native-bottom-tabs/commit/9e1c9c61d742c435ac5e0901b7e0c9249b9fc70c x_refsource_MISC
cve.org
访问
https://callstack.notion.site/Post-Incident-Security-Measures-GitHub-Actions-Workflow-Vulnerability-2405d027c0f8804ab7f7cdfb43366a31 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
CRITICAL
9.1
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
机密性
HIGH
完整性
HIGH
可用性
NONE
时间信息
发布时间:
2025-08-05 23:31:53
修改时间:
2025-08-06 20:29:56
创建时间:
2025-11-11 15:40:42
更新时间:
2025-11-11 16:00:08
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-54594 2025-11-11 15:23:29 2025-11-11 07:40:42
NVD nvd_CVE-2025-54594 2025-11-11 15:00:58 2025-11-11 07:48:30
CNNVD cnnvd_CNNVD-202508-408 2025-11-11 15:12:52 2025-11-11 08:00:08
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:08
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202508-408; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202508-408
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:30
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']