{"vulnerability": "CVE-2025-32953", "sightings": [{"uuid": "8e841cff-abb8-46ca-b970-f2d20f52ca88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32953", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ln4ry4oajim2", "content": "", "creation_timestamp": "2025-04-18T23:36:24.648459Z"}, {"uuid": "ad5e0774-acb6-446b-a74e-fa2e382fdeb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32953", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114361636530880100", "content": "", "creation_timestamp": "2025-04-18T23:48:10.794038Z"}, {"uuid": "bbded36b-764d-4351-9685-df35613b52fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32953", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln4ts4xo5q2l", "content": "", "creation_timestamp": "2025-04-19T00:08:45.327921Z"}, {"uuid": "b478134b-309e-437f-b7ba-a7b896515a65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32953", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12538", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32953\n\ud83d\udd25 CVSS Score: 8.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H)\n\ud83d\udd39 Description: z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.\n\ud83d\udccf Published: 2025-04-18T20:42:46.655Z\n\ud83d\udccf Modified: 2025-04-18T20:42:46.655Z\n\ud83d\udd17 References:\n1. https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q\n2. https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da\n3. https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d\n4. https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91\n5. https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15", "creation_timestamp": "2025-04-18T20:59:20.000000Z"}, {"uuid": "e79f2c07-5a11-4570-b7b8-17e68abce3ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32953", "type": "published-proof-of-concept", "source": "Telegram/oRg411HAomHdISM9O3TVQssrB2w8dJGX9X47vD_NRx0yd1g", "content": "", "creation_timestamp": "2025-04-18T23:30:24.000000Z"}, {"uuid": "687081e7-545e-4dce-976a-48fa89f78ed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32953", "type": "seen", "source": "https://t.me/cvedetector/23352", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32953 - Z80pack GitHub Token Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-32953 \nPublished : April 18, 2025, 9:15 p.m. | 1\u00a0hour, 30\u00a0minutes ago \nDescription : z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916. \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-19T00:56:36.000000Z"}]}