CVSS 3.1 Score 8.8 of 10 (high)


Published Dec 29, 2023
Updated: Jan 10, 2024


CVE-2023-52137, a command injection vulnerability, affects the tj-actions/verify-changed-files action. This vulnerability allows an attacker to execute arbitrary code and potentially leak secrets by injecting commands in changed filenames. The verify-changed-files workflow returns the list of changed files, and if the output value is used directly in a run block without proper sanitization, an attacker can take control of the GitHub Runner. The danger lies in the potential theft of sensitive information, such as GITHUB_TOKEN, if triggered on events other than pull_request. The vulnerability has been patched in versions 17 and [17.0.0]. The severity is rated as HIGH with a base score of 8.8 according to NIST's CVSS v3.1 assessment.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-52137 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options