The server allow to create any user who can trigger a pipeline run malicious workflows: - Those workflows can either lead to a host takeover that runs the agent executing the workflow. - Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten.
https://github.com/woodpecker-ci/woodpecker/pull/3933
Is there a way for users to fix or remediate the vulnerability without upgrading? Enable the "gated" repo feature and review each change upfront
{ "github_reviewed_at": "2024-07-19T19:59:08Z", "cwe_ids": [ "CWE-22", "CWE-74" ], "nvd_published_at": "2024-07-19T20:15:08Z", "severity": "HIGH", "github_reviewed": true }