Meshtastic is an open source mesh networking solution. The main_matrix.yml GitHub Action is triggered by the pull_request_target event, which has extensive permissions, and can be initiated by an attacker who forked the repository and created a pull request. In the shell code execution part, user-controlled input is interpolated unsafely into the code. If this were to be exploited, attackers could inject unauthorized code into the repository. This vulnerability is fixed in 2.6.6.
References
Configurations
No configuration.
History
15 Jul 2025, 13:14
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-10 22:15
Updated : 2025-07-15 13:14
NVD link : CVE-2025-53637
Mitre link : CVE-2025-53637
CVE.ORG link : CVE-2025-53637
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')