← Back to CVEs
CVE-2025-53637
MEDIUM4.1
Description
Meshtastic is an open source mesh networking solution. The main_matrix.yml GitHub Action is triggered by the pull_request_target event, which has extensive permissions, and can be initiated by an attacker who forked the repository and created a pull request. In the shell code execution part, user-controlled input is interpolated unsafely into the code. If this were to be exploited, attackers could inject unauthorized code into the repository. This vulnerability is fixed in 2.6.6.
CVE Details
CVSS v3.1 Score4.1
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published7/10/2025
Last Modified8/22/2025
Sourcenvd
Honeypot Sightings0
Affected Products
meshtastic:meshtastic_firmware
Weaknesses (CWE)
CWE-78
References
https://github.com/meshtastic/firmware/blob/3fd47d9713e7d1b6866c48cf218e2435741651a2/.github/workflows/main_matrix.yml#L34-L41(security-advisories@github.com)
https://github.com/meshtastic/firmware/security/advisories/GHSA-6mwm-v2vv-pp96(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.