CVE-2025-52467 PUBLISHED

pgai secrets exfiltration via `pull_request_target`

Assigner: GitHub_M
Reserved: 17.06.2025 Published: 19.06.2025 Updated: 19.06.2025

pgai is a Python library that transforms PostgreSQL into a retrieval engine for RAG and Agentic applications. Prior to commit 8eb3567, the pgai repository was vulnerable to an attack allowing the exfiltration of all secrets used in one workflow. In particular, the GITHUB_TOKEN with write permissions for the repository, allowing an attacker to tamper with all aspects of the repository, including pushing arbitrary code and releases. This issue has been patched in commit 8eb3567.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 9.1

Product Status

Vendor timescale
Product pgai
Versions
  • Version < 8eb356729c33560ce54b88b9a956960ad1e3ede8 is affected

References

Problem Types

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE