The OZI action is a GitHub Action that publishes releases to PyPI and mirror releases, signature bundles, and provenance in a tagged release. In versions 1.13.2 through 1.13.5, potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. This is patched in 1.13.6. As a workaround, one may downgrade to a version prior to 1.13.2.
Metrics
Affected Vendors & Products
References
History
Mon, 12 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 May 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The OZI action is a GitHub Action that publishes releases to PyPI and mirror releases, signature bundles, and provenance in a tagged release. In versions 1.13.2 through 1.13.5, potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. This is patched in 1.13.6. As a workaround, one may downgrade to a version prior to 1.13.2. | |
| Title | OZI-Project/ozi-publish Code Injection vulnerability | |
| Weaknesses | CWE-1116 CWE-94 CWE-95 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-12T10:52:26.916Z
Updated: 2025-05-12T12:12:40.770Z
Reserved: 2025-05-05T16:53:10.372Z
Link: CVE-2025-47271
Updated: 2025-05-12T12:12:36.858Z
Status : Awaiting Analysis
Published: 2025-05-12T11:15:51.190
Modified: 2025-05-12T17:32:32.760
Link: CVE-2025-47271
No data.