CVE-2025-53546

Public Exploit
Folo allows secrets exfiltration via `pull_request_target`

Description

Folo organizes feeds content into one timeline. Using pull_request_target on .github/workflows/auto-fix-lint-format-commit.yml can be exploited by attackers, since untrusted code can be executed having full access to secrets (from the base repo). By exploiting the vulnerability is possible to exfiltrate GITHUB_TOKEN which has high privileges. GITHUB_TOKEN can be used to completely overtake the repo since the token has content write privileges. This vulnerability is fixed in commit 585c6a591440cd39f92374230ac5d65d7dd23d6a.

Category

9.1
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.03%
Affected: RSSNext Folo
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-53546?
CVE-2025-53546 has been scored as a critical severity vulnerability.
How to fix CVE-2025-53546?
To fix CVE-2025-53546, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-53546 being actively exploited in the wild?
It is possible that CVE-2025-53546 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-53546?
CVE-2025-53546 affects RSSNext Folo.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.