CVE-2025-24362
Severity CVSS v4.0:
HIGH
Type:
CWE-532
Information Exposure Through Log Files
Publication date:
24/01/2025
Last modified:
15/04/2026
Description
In some circumstances, debug artifacts uploaded by the CodeQL Action after a failed code scanning workflow run may contain the environment variables from the workflow run, including any secrets that were exposed as environment variables to the workflow. Users with read access to the repository would be able to access this artifact, containing any secrets from the environment. This vulnerability is patched in CodeQL Action version 3.28.3 or later, or CodeQL CLI version 2.20.3 or later.<br />
<br />
For some affected workflow runs, the exposed environment variables in the debug artifacts included a valid `GITHUB_TOKEN` for the workflow run, which has access to the repository in which the workflow ran, and all the permissions specified in the workflow or job. The `GITHUB_TOKEN` is valid until the job completes or 24 hours has elapsed, whichever comes first.<br />
<br />
Environment variables are exposed only from workflow runs that satisfy all of the following conditions:<br />
- Code scanning workflow configured to scan the Java/Kotlin languages.<br />
- Running in a repository containing Kotlin source code.<br />
- Running with debug artifacts enabled.<br />
- Using CodeQL Action versions = 2.9.2 (May 2022) and = 3.26.11 (October 2024) and = 2.26.11 and = 2.9.2 and = 3.26.11 and = 2.26.11 and
Impact
Base Score 4.0
7.10
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://docs.github.com/en/code-security/code-scanning/troubleshooting-code-scanning/logs-not-detailed-enough
- https://github.com/github/codeql-action/commit/519de26711ecad48bde264c51e414658a82ef3fa
- https://github.com/github/codeql-action/pull/1074
- https://github.com/github/codeql-action/pull/2482
- https://github.com/github/codeql-action/security/advisories/GHSA-vqf5-2xx6-9wfm
- https://github.com/github/codeql-cli-binaries/security/advisories/GHSA-gqh3-9prg-j95m
- https://news.ycombinator.com/item?id=43527044
- https://www.praetorian.com/blog/codeqleaked-public-secrets-exposure-leads-to-supply-chain-attack-on-github-codeql/



