๐Ÿ” CVE Alert

CVE-2025-30066

HIGH 8.6 โš ๏ธ CISA KEV
CVSS Score
8.6
EPSS Score
0.0%
EPSS Percentile
0th

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

CWE CWE-506
Vendor tj-actions
Product changed-files
Published Mar 15, 2025
Last Updated Feb 26, 2026
โš ๏ธ Actively Exploited โ€” Act Now

Get instant alerts for tj-actions changed-files

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2025-30066.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

tj-actions / changed-files
1 < 46

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/github/docs/blob/962a1c8dccb8c0f66548b324e5b921b5e4fbc3d6/content/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions.md?plain=1#L191-L193 github.com: https://github.com/tj-actions/changed-files/issues/2463 stepsecurity.io: https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised semgrep.dev: https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/ news.ycombinator.com: https://news.ycombinator.com/item?id=43368870 web.archive.org: https://web.archive.org/web/20250315060250/https://github.com/tj-actions/changed-files/issues/2463 news.ycombinator.com: https://news.ycombinator.com/item?id=43367987 github.com: https://github.com/rackerlabs/genestack/pull/903 github.com: https://github.com/chains-project/maven-lockfile/pull/1111 sysdig.com: https://sysdig.com/blog/detecting-and-mitigating-the-tj-actions-changed-files-supply-chain-attack-cve-2025-30066/ github.com: https://github.com/espressif/arduino-esp32/issues/11127 github.com: https://github.com/modal-labs/modal-examples/issues/1100 github.com: https://github.com/tj-actions/changed-files/issues/2464 github.com: https://github.com/tj-actions/changed-files/blob/45fb12d7a8bedb4da42342e52fe054c6c2c3fd73/README.md?plain=1#L20-L28 wiz.io: https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066 stream.security: https://www.stream.security/post/github-action-supply-chain-attack-exposes-secrets-what-you-need-to-know-and-how-to-respond sweet.security: https://www.sweet.security/blog/cve-2025-30066-tj-actions-supply-chain-attack github.com: https://github.com/tj-actions/changed-files/issues/2477 blog.gitguardian.com: https://blog.gitguardian.com/compromised-tj-actions/ cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-30066 cisa.gov: https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-github-action-cve-2025-30066