CISA Warns of Active Exploitation in GitHub Action Supply Chain Attack

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-30066 to its Known Exploited Vulnerabilities catalog, warning of a supply chain compromise in GitHub Actions. The vulnerability, affecting tj-actions/changed-files, allows attackers to extract sensitive secrets such as AWS keys and GitHub tokens from logs. The compromise was traced to reviewdog/action-setup@v1, a dependency, indicating a cascading supply chain attack. Affected users must update tj-actions/changed-files to version 46.0.1 by April 4, 2025.

Expert Analysis:

This incident underscores the persistent risks in CI/CD security. Open-source dependencies remain an easy vector for exploitation, with attackers leveraging compromised personal access tokens (PATs) to inject malicious code. What’s concerning is the silent nature of such breaches—organizations often fail to detect malicious updates until it’s too late.

Supply chain security isn’t optional anymore. Pinning dependencies to specific commit hashes, continuous code integrity monitoring, and least privilege access policies must become standard practice.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

G7 Evian 2026: The Cyber Risk Map and Recommendations

Copy Fail: When 732 Bytes of Python Can Root Every Linux Server You Manage

Risk & opportunity with Claude Mythos - ZENDATA

Mythos, LLMs, and the end of the security paradigm as we knew it – interview on Swiss TV RTS