{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T16:52:28.031","vulnerabilities":[{"cve":{"id":"CVE-2024-41127","sourceIdentifier":"security-advisories@github.com","published":"2024-08-02T15:16:36.503","lastModified":"2024-09-11T14:52:15.690","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Monkeytype is a minimalistic and customizable typing test. Monkeytype is vulnerable to Poisoned Pipeline Execution through Code Injection in its ci-failure-comment.yml GitHub Workflow, enabling attackers to gain pull-requests write access. The ci-failure-comment.yml workflow is triggered when the Monkey CI workflow completes. When it runs, it will download an artifact uploaded by the triggering workflow and assign the contents of ./pr_num/pr_num.txt artifact to the steps.pr_num_reader.outputs.content WorkFlow variable. It is not validated that the variable is actually a number and later it is interpolated into a JS script allowing an attacker to change the code to be executed. This issue leads to pull-requests write access. This vulnerability is fixed in 24.30.0."},{"lang":"es","value":"Monkeytype es una prueba de mecanografía minimalista y personalizable. Monkeytype es vulnerable a la ejecución de canalización envenenada mediante inyección de código en su flujo de trabajo de GitHub ci-failure-comment.yml, lo que permite a los atacantes obtener acceso de escritura a solicitudes de extracción. El flujo de trabajo ci-failure-comment.yml se activa cuando se completa el flujo de trabajo de Monkey CI. Cuando se ejecute, descargará un artefacto cargado por el flujo de trabajo desencadenante y asignará el contenido del artefacto ./pr_num/pr_num.txt a la variable de flujo de trabajo steps.pr_num_reader.outputs.content. No se valida que la variable sea en realidad un número y luego se interpola en un script JS que permite a un atacante cambiar el código a ejecutar. Este problema conduce al acceso de escritura de las solicitudes de extracción. Esta vulnerabilidad se solucionó en 24.30.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:monkeytype:monkeytype:*:*:*:*:*:*:*:*","versionEndExcluding":"24.30.0","matchCriteriaId":"6D09169A-F904-4F72-9084-912E77340CA1"}]}]}],"references":[{"url":"https://github.com/monkeytypegame/monkeytype/commit/29627fd0d5f152e2da59671987090ea0a5c29874","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-wcjf-5464-4wq9","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://securitylab.github.com/advisories/GHSL-2024-167_monkeytype","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]}]}}]}