{"vulnerability": "CVE-2025-47928", "sightings": [{"uuid": "c9c4ef4c-bed1-472b-8699-7a0d1faa0242", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47928", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16552", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47928\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Spotipy is a Python library for the Spotify Web API. As of commit 4f5759dbfb4506c7b6280572a4db1aabc1ac778d, using `pull_request_target` on `.github/workflows/integration_tests.yml` followed by the checking out the head.sha of a forked PR can be exploited by attackers, since untrusted code can be executed having full access to secrets (from the base repo). By exploiting the vulnerability is possible to exfiltrate `GITHUB_TOKEN` and secrets `SPOTIPY_CLIENT_ID`,  `SPOTIPY_CLIENT_SECRET`. In particular `GITHUB_TOKEN` which can be used to completely overtake the repo since the token has content write privileges. The `pull_request_target` in GitHub Actions is a major security concern\u2014especially in public repositories\u2014because it executes untrusted code from a PR, but with the context of the base repository, including access to its secrets. Commit 9dfb7177b8d7bb98a5a6014f8e6436812a47576f reverted the change that caused the issue.\n\ud83d\udccf Published: 2025-05-15T20:09:48.326Z\n\ud83d\udccf Modified: 2025-05-15T20:18:00.369Z\n\ud83d\udd17 References:\n1. https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-h25v-8c87-rvm8\n2. https://github.com/spotipy-dev/spotipy/commit/4f5759dbfb4506c7b6280572a4db1aabc1ac778d\n3. https://github.com/spotipy-dev/spotipy/commit/9dfb7177b8d7bb98a5a6014f8e6436812a47576f", "creation_timestamp": "2025-05-15T20:33:31.000000Z"}, {"uuid": "34d54c3c-ea45-47d9-a34f-d63e56a6e2de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47928", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpalbvlsq52h", "content": "", "creation_timestamp": "2025-05-15T22:37:33.551346Z"}]}