The OZI action is a GitHub Action that publishes releases to PyPI and mirror releases, signature bundles, and provenance in a tagged release. In versions 1.13.2 through 1.13.5, potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. This is patched in 1.13.6. As a workaround, one may downgrade to a version prior to 1.13.2.
Metrics
Affected Vendors & Products
References
History
Mon, 12 May 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 12 May 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The OZI action is a GitHub Action that publishes releases to PyPI and mirror releases, signature bundles, and provenance in a tagged release. In versions 1.13.2 through 1.13.5, potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. This is patched in 1.13.6. As a workaround, one may downgrade to a version prior to 1.13.2. | |
Title | OZI-Project/ozi-publish Code Injection vulnerability | |
Weaknesses | CWE-1116 CWE-94 CWE-95 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-12T10:52:26.916Z
Updated: 2025-05-12T12:12:40.770Z
Reserved: 2025-05-05T16:53:10.372Z
Link: CVE-2025-47271

Updated: 2025-05-12T12:12:36.858Z

Status : Awaiting Analysis
Published: 2025-05-12T11:15:51.190
Modified: 2025-05-12T17:32:32.760
Link: CVE-2025-47271

No data.