The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-32958

CVE-2025-32958: Adept Language Token Exposure Vulnerability

CVE-2025-32958 is an information disclosure vulnerability in Adept Language that exposes GITHUB_TOKEN through workflow artifacts, allowing attackers to push malicious code. This article covers technical details, impact, and mitigation.

Published: March 25, 2026

CVE-2025-32958 Overview

CVE-2025-32958 is an information exposure vulnerability in the Adept programming language's GitHub repository. Prior to commit a1a41b7, the remoteBuild.yml workflow file uses actions/upload-artifact@v4 to upload the mac-standalone artifact. This artifact is a zip of the current directory, which includes the automatically generated .git/config file containing the run's GITHUB_TOKEN. Since the artifact can be downloaded prior to the end of the workflow, there is a brief window where an attacker can extract the token from the artifact and use it with the GitHub API to push malicious code or rewrite release commits in the AdeptLanguage/Adept repository.

Critical Impact

This vulnerability allows unauthenticated remote attackers to extract valid GitHub tokens from workflow artifacts, potentially enabling repository compromise, malicious code injection, and supply chain attacks against the Adept programming language project.

Affected Products

  • AdeptLanguage/Adept GitHub repository (prior to commit a1a41b7)
  • Adept programming language build workflows using remoteBuild.yml
  • Systems relying on Adept releases built through the vulnerable CI/CD pipeline

Discovery Timeline

  • 2025-04-21 - CVE-2025-32958 published to NVD
  • 2025-04-23 - Last updated in NVD database

Technical Details for CVE-2025-32958

Vulnerability Analysis

This vulnerability represents a classic information disclosure flaw (CWE-200) in CI/CD pipeline configuration. The root issue lies in the improper handling of sensitive credentials within GitHub Actions workflows. When the remoteBuild.yml workflow executes, it creates a build artifact containing the entire working directory without properly excluding sensitive files.

The .git/config file automatically generated during workflow execution contains the GITHUB_TOKEN environment variable, which provides authenticated access to the repository. By design, GitHub Actions artifacts become downloadable as soon as the upload step completes, but the workflow may continue executing for several more seconds or minutes. This creates a race condition window where an attacker monitoring the repository can download the artifact, extract the token, and use it before the workflow completes and the token expires.

Root Cause

The vulnerability stems from insecure artifact packaging practices in the CI/CD workflow. The actions/upload-artifact@v4 action was configured to zip and upload the entire current directory without excluding the .git folder and its contents. This is a common misconfiguration where developers focus on including necessary build outputs but fail to explicitly exclude sensitive configuration files that may contain secrets or credentials.

The .git/config file contains repository configuration including, in GitHub Actions environments, the GITHUB_TOKEN which is automatically provided to workflows for repository operations. This token typically has write access to the repository contents and can be used to push commits, create releases, or modify existing code.

Attack Vector

The attack exploits the network-accessible nature of GitHub Actions artifacts combined with a timing vulnerability in the workflow execution. An attacker would need to:

  1. Monitor the target repository for workflow runs using the GitHub API or web interface
  2. Immediately download the uploaded artifact when it becomes available during workflow execution
  3. Extract the .git/config file from the artifact archive
  4. Parse the GITHUB_TOKEN from the configuration file
  5. Use the token with the GitHub API to perform malicious actions before the workflow completes and the token is invalidated

The vulnerability is exploitable without authentication (with respect to the artifact download, which is public for public repositories) and requires no user interaction, making it particularly dangerous for open-source projects.

Detection Methods for CVE-2025-32958

Indicators of Compromise

  • Unexpected commits or releases in the AdeptLanguage/Adept repository not matching legitimate developer activity
  • GitHub API access logs showing token usage from unfamiliar IP addresses during or shortly after workflow runs
  • Artifact download requests occurring immediately after upload completion, potentially from automated systems
  • Modified release assets or binaries that differ from expected build outputs
  • Unusual repository permission changes or branch protection modifications

Detection Strategies

  • Audit GitHub repository audit logs for API calls made with GITHUB_TOKEN during active workflow runs
  • Monitor for artifact downloads that occur within seconds of artifact upload completion
  • Review commit history for commits made during workflow execution timeframes that weren't part of the workflow itself
  • Implement integrity checking for release artifacts by comparing hashes against known-good builds
  • Set up alerts for repository configuration changes, especially those modifying branch protections or access controls

Monitoring Recommendations

  • Enable GitHub repository audit logging and regularly review API access patterns
  • Implement webhook-based monitoring for repository events during workflow executions
  • Use GitHub's security advisories and Dependabot to track updates to the Adept project
  • Monitor for mentions of the repository in security research forums or vulnerability disclosure channels
  • Establish baseline metrics for normal artifact download patterns to detect anomalies

How to Mitigate CVE-2025-32958

Immediate Actions Required

  • Update the AdeptLanguage/Adept repository to commit a1a41b7 or later which contains the security fix
  • Review repository audit logs for any suspicious activity that may indicate past exploitation
  • Rotate any secrets or tokens that may have been exposed through previously uploaded artifacts
  • Verify the integrity of recent releases and commits to ensure no malicious modifications occurred
  • Consider re-signing or re-releasing recent builds from a verified clean state

Patch Information

The vulnerability has been patched in commit a1a41b72cdf1bebfc0cf6d7b3a8350e6406b2220. Users and developers relying on the Adept programming language should ensure they are using builds produced after this commit. The fix modifies the artifact upload configuration to properly exclude the .git directory and its sensitive contents from the uploaded archive.

For more details, see the GitHub Security Advisory GHSA-8c7v-vccv-cx4q.

Workarounds

  • Manually modify the remoteBuild.yml workflow to add exclusion patterns for .git/ directory before uploading artifacts
  • Use a separate, isolated directory for artifact collection instead of zipping the entire working directory
  • Implement pre-upload scripts that sanitize the working directory by removing sensitive files
  • Consider using actions/upload-artifact with explicit path specifications rather than directory-wide uploads
  • Temporarily disable automated artifact uploads until the patched version can be deployed
bash
# Example: Add .git to artifact exclusion in workflow
# In your remoteBuild.yml, modify the upload-artifact step:
# 
# - uses: actions/upload-artifact@v4
#   with:
#     name: mac-standalone
#     path: |
#       .
#       !.git/
#       !.git/**

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechAdept

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.41%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-200
  • Technical References
  • GitHub Commit Update

  • GitHub Security Advisory GHSA-8c7v-vccv-cx4q
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English