{"vulnerability": "CVE-2025-32111", "sightings": [{"uuid": "f0366b2b-fed4-4099-9b38-45fc45b9b427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32111", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10415", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32111\n\ud83d\udd25 CVSS Score: 8.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: The Docker image from acme.sh before 40b6db6 is based on a .github/workflows/dockerhub.yml file that lacks \"persist-credentials: false\" for actions/checkout.\n\ud83d\udccf Published: 2025-04-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-04T06:44:25.598Z\n\ud83d\udd17 References:\n1. https://github.com/acmesh-official/acme.sh/commit/a1de13657e79c5471dbc8fa3539ea39160937389\n2. https://github.com/acmesh-official/acme.sh/commit/40b6db6a2715628aa977ed1853fe5256704010ae\n3. https://github.com/actions/checkout/blob/85e6279cec87321a52edac9c87bce653a07cf6c2/README.md?plain=1#L70-L72", "creation_timestamp": "2025-04-04T07:36:10.000000Z"}, {"uuid": "2678b5ad-104b-4b9e-9634-ad5121f74d2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32111", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxxalmcos2w", "content": "", "creation_timestamp": "2025-04-04T08:02:03.058879Z"}, {"uuid": "e3a835ff-0779-4921-82b3-466b6e4233ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32111", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114279062301532369", "content": "", "creation_timestamp": "2025-04-04T09:48:28.382163Z"}, {"uuid": "185ff6c5-7619-4dfc-a847-e1f1744d5ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32111", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114279062301532369", "content": "", "creation_timestamp": "2025-04-04T09:48:28.398395Z"}, {"uuid": "c98aaaeb-0664-4131-99b1-5a3b095b54be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32111", "type": "seen", "source": "https://t.me/cvedetector/22087", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32111 - Docker/Acme.sh Insecure GitHub Workflow Credentials Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-32111 \nPublished : April 4, 2025, 7:15 a.m. | 39\u00a0minutes ago \nDescription : The Docker image from acme.sh before 40b6db6 is based on a .github/workflows/dockerhub.yml file that lacks \"persist-credentials: false\" for actions/checkout. \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T10:29:18.000000Z"}]}