The OZI action is a GitHub Action that publishes releases to PyPI and mirror releases, signature bundles, and provenance in a tagged release. In versions 1.13.2 through 1.13.5, potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. This is patched in 1.13.6. As a workaround, one may downgrade to a version prior to 1.13.2.
History

Mon, 12 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 12 May 2025 11:00:00 +0000

Type Values Removed Values Added
Description The OZI action is a GitHub Action that publishes releases to PyPI and mirror releases, signature bundles, and provenance in a tagged release. In versions 1.13.2 through 1.13.5, potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. This is patched in 1.13.6. As a workaround, one may downgrade to a version prior to 1.13.2.
Title OZI-Project/ozi-publish Code Injection vulnerability
Weaknesses CWE-1116
CWE-94
CWE-95
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-05-12T10:52:26.916Z

Updated: 2025-05-12T12:12:40.770Z

Reserved: 2025-05-05T16:53:10.372Z

Link: CVE-2025-47271

cve-icon Vulnrichment

Updated: 2025-05-12T12:12:36.858Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-12T11:15:51.190

Modified: 2025-05-12T17:32:32.760

Link: CVE-2025-47271

cve-icon Redhat

No data.