Adept is a language for general purpose programming. Prior to commit a1a41b7, the remoteBuild.yml workflow file uses actions/upload-artifact@v4 to upload the mac-standalone artifact. This artifact is a zip of the current directory, which includes the automatically generated .git/config file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in the AdeptLanguage/Adept repository. This issue has been patched in commit a1a41b7.
                
            References
                    Configurations
                    No configuration.
History
                    23 Apr 2025, 14:08
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
21 Apr 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-21 21:15
Updated : 2025-04-23 14:08
NVD link : CVE-2025-32958
Mitre link : CVE-2025-32958
CVE.ORG link : CVE-2025-32958
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
