CISA Warns of Active Exploitation in GitHub Action Supply Chain Attack

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-30066 to its Known Exploited Vulnerabilities catalog, warning of a supply chain compromise in GitHub Actions. The vulnerability, affecting tj-actions/changed-files, allows attackers to extract sensitive secrets such as AWS keys and GitHub tokens from logs. The compromise was traced to reviewdog/action-setup@v1, a dependency, indicating a cascading supply chain attack. Affected users must update tj-actions/changed-files to version 46.0.1 by April 4, 2025.

Expert Analysis:

This incident underscores the persistent risks in CI/CD security. Open-source dependencies remain an easy vector for exploitation, with attackers leveraging compromised personal access tokens (PATs) to inject malicious code. What’s concerning is the silent nature of such breaches—organizations often fail to detect malicious updates until it’s too late.

Supply chain security isn’t optional anymore. Pinning dependencies to specific commit hashes, continuous code integrity monitoring, and least privilege access policies must become standard practice.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

New Twint Cyber Threat in 2025 | How Protect Yourself | ZENDATA

New Twint Cyber Threat in 2025

Logitech Targeted in Clop Cyberattack | ZENDATA Insight

Logitech Named in Cyberattack interview in Le Temps

Inside ZENDATA’s AI Powered SOC Dubai: How L1, L2 and L3 Cybersecurity Services Protect Your Business 24/7

Inside our AI Powered SOC in Dubai