Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-63wh-p5fx-h4vc | BBOT's git_clone.py can expose users' GitHub API keys to an attacker-controlled webserver |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Blsops
Blsops bbot |
|
| Vendors & Products |
Blsops
Blsops bbot |
Thu, 09 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BBOT's git_clone module could be abused to disclose a GitHub API key to an attacker controlled server with a malicious formatted git URL. | |
| Title | Insecure URL Handling in git_clone Leading to Leaked API Key | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: BLSOPS
Published:
Updated: 2025-10-09T19:04:36.247Z
Reserved: 2025-09-11T16:19:02.209Z
Link: CVE-2025-10281
Updated: 2025-10-09T19:04:30.934Z
Status : Awaiting Analysis
Published: 2025-10-09T16:15:42.807
Modified: 2025-10-14T19:37:28.107
Link: CVE-2025-10281
No data.
OpenCVE Enrichment
Updated: 2025-10-10T11:18:01Z
Github GHSA