Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7091 | kartverket/github-workflows are shared reusable workflows for GitHub Actions. Prior to version 2.7.5, all users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected by a code injection vulnerability. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow. Users should upgrade to at least version 2.7.5 to resolve the issue. As a workaround, review any pull requests from external users for malicious payloads before allowing them to trigger a build. |
Github GHSA |
GHSA-f9qj-7gh3-mhj4 | run-terraform allows for RCE via terraform plan |
Thu, 24 Apr 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T16:44:28.558Z
Reserved: 2022-09-02T00:00:00.000Z
Link: CVE-2022-39326
Updated: 2024-08-03T12:00:44.038Z
Status : Modified
Published: 2022-10-25T17:15:56.087
Modified: 2024-11-21T07:18:02.640
Link: CVE-2022-39326
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA