CVE-2025-32953
Description
z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the makefile-ubuntu.yml workflow file uses actions/upload-artifact@v4 to upload the z80pack-ubuntu artifact. This artifact is a zip of the current directory, which includes the automatically generated .git/config file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.
Patches
41e06c2fe498c836c2e37b54f95535987d690bd9591615ae7Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47danvd
- github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308dnvd
- github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91nvd
- github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15nvd
- github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3qnvd
News mentions
0No linked articles in our index yet.