gluestack-ui is a library of copy-pasteable components & patterns crafted with Tailwind CSS (NativeWind). Prior to commit e6b4271, a command injection vulnerability was discovered in the discussion-to-slack.yml GitHub Actions workflow. Untrusted discussion fields (title, body, etc.) were directly interpolated into shell commands in a run: block. An attacker could craft a malicious GitHub Discussion title or body (e.g., $(curl ...)) to execute arbitrary shell commands on the Actions runner. This issue has been fixed in commit e6b4271 where the discussion-to-slack.yml workflow was removed. Users should remove the discussion-to-slack.yml workflow if using a fork or derivative of this repository.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 01 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 01 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | gluestack-ui is a library of copy-pasteable components & patterns crafted with Tailwind CSS (NativeWind). Prior to commit e6b4271, a command injection vulnerability was discovered in the discussion-to-slack.yml GitHub Actions workflow. Untrusted discussion fields (title, body, etc.) were directly interpolated into shell commands in a run: block. An attacker could craft a malicious GitHub Discussion title or body (e.g., $(curl ...)) to execute arbitrary shell commands on the Actions runner. This issue has been fixed in commit e6b4271 where the discussion-to-slack.yml workflow was removed. Users should remove the discussion-to-slack.yml workflow if using a fork or derivative of this repository. | |
| Title | gluestack-ui Command Injection Vulnerability via discussion-to-slack GitHub Action Workflow | |
| Weaknesses | CWE-77 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-01T18:17:01.667Z
Updated: 2025-07-01T19:18:51.273Z
Reserved: 2025-06-25T13:41:23.086Z
Link: CVE-2025-53104
Updated: 2025-07-01T19:18:29.678Z
Status : Awaiting Analysis
Published: 2025-07-01T19:15:27.800
Modified: 2025-07-03T15:14:12.767
Link: CVE-2025-53104
No data.