CVE-2025-32953 – Z80pack GitHub Token Exposure

The following table lists the changes that have been made to the
CVE-2025-32953 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Apr. 18, 2025

    Action Type Old Value New Value
    Added Description z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run’s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.
    Added CVSS V3.1 AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
    Added CWE CWE-200
    Added Reference https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da
    Added Reference https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d
    Added Reference https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91
    Added Reference https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15
    Added Reference https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q
Share the Post:

Related Posts