The server allow to create any user who can trigger a pipeline run malicious workflows: - Those workflows can either lead to a host takeover that runs the agent executing the workflow. - Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten.
https://github.com/woodpecker-ci/woodpecker/pull/3933
Is there a way for users to fix or remediate the vulnerability without upgrading? Enable the "gated" repo feature and review each change upfront
{
"nvd_published_at": "2024-07-19T20:15:08Z",
"severity": "HIGH",
"github_reviewed_at": "2024-07-19T19:59:08Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-22",
"CWE-74"
]
}