CVE-2025-32958: Adept exposed the GITHUB_TOKEN in workflow run artifact

9.8 CVSS

Description

Adept is a language for general purpose programming. Prior to commit a1a41b7, the remoteBuild.yml workflow file uses actions/upload-artifact@v4 to upload the mac-standalone artifact. This artifact is a zip of the current directory, which includes the automatically generated .git/config file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in the AdeptLanguage/Adept repository. This issue has been patched in commit a1a41b7.

Classification

CVE ID: CVE-2025-32958

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem Types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Affected Products

Vendor: AdeptLanguage

Product: Adept

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 17.65% (scored less or equal to compared to others)

EPSS Date: 2025-05-20 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-32958
https://github.com/AdeptLanguage/Adept/security/advisories/GHSA-8c7v-vccv-cx4q
https://github.com/AdeptLanguage/Adept/commit/a1a41b72cdf1bebfc0cf6d7b3a8350e6406b2220

Timeline