#VU105991 Embedded malicious code (backdoor) in reviewdog - CVE-2025-30154


Vulnerability identifier: #VU105991

Vulnerability risk: Critical

CVSSv4.0: 7.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:A/U:Red]

CVE-ID: CVE-2025-30154

CWE-ID: CWE-506

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
reviewdog
Universal components / Libraries / Software for developers

Vendor: reviewdog

Description

The vulnerability allows a remote attacker to gain unauthorized access to the application.

The reviewdog/action-setup@v1 repository was compromised on March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added to it. Purpose of the malicious code was to dumps exposed secrets to Github Actions Workflow Logs.

Other reviewdog actions that use reviewdog/action-setup@v1 would also be compromised, regardless of version or pinning method:

  • reviewdog/action-shellcheck
  • reviewdog/action-composite-template
  • reviewdog/action-staticcheck
  • reviewdog/action-ast-grep
  • reviewdog/action-typos


Mitigation
Install updates from vendor's website.

Vulnerable software versions

reviewdog: f0d342d


External links
https://github.com/reviewdog/action-setup/commit/3f401fe1d58fe77e10d665ab713057375e39b887
https://github.com/reviewdog/action-setup/commit/f0d342d24037bb11d26b9bd8496e0808ba32e9ec
https://github.com/reviewdog/reviewdog/issues/2079
https://github.com/reviewdog/reviewdog/security/advisories/GHSA-qmg3-hpqr-gqvc
https://www.wiz.io/blog/new-github-action-supply-chain-attack-reviewdog-action-setup


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability