CVSS 3.1 Score 9.3 of 10 (high)


Published Dec 5, 2023
Updated: Dec 8, 2023


CVE-2023-49291 is a vulnerability affecting the `tj-actions/branch-names` GitHub action. This vulnerability allows an attacker to execute arbitrary code by exploiting the improperly referenced `github.event.pull_request.head.ref` and `github.head_ref` context variables. By crafting a specially designed branch name, an attacker can abuse the `GITHUB_TOKEN` permissions and potentially steal secrets from or compromise the organization. The vulnerability has been addressed in version 7.0.7, and users are advised to upgrade to this version as there are no known workarounds. The risk score for this vulnerability is 65, with a base severity of CRITICAL and a base score of 9.3 according to the CVSS:3.1 scoring system.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-49291 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options