{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-47775","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-05-09T19:49:35.619Z","datePublished":"2025-05-14T15:18:37.058Z","dateUpdated":"2025-05-14T15:42:42.206Z"},"containers":{"cna":{"title":"Bullfrog's DNS over TCP bypasses domain filtering","problemTypes":[{"descriptions":[{"cweId":"CWE-201","lang":"en","description":"CWE-201: Insertion of Sensitive Information Into Sent Data","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":6.2,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/bullfrogsec/bullfrog/security/advisories/GHSA-m32f-fjw2-37v3","tags":["x_refsource_CONFIRM"],"url":"https://github.com/bullfrogsec/bullfrog/security/advisories/GHSA-m32f-fjw2-37v3"},{"name":"https://github.com/bullfrogsec/bullfrog/commit/ae7744ae4b3a6f8ffc2e49f501e30bf1a43d4671","tags":["x_refsource_MISC"],"url":"https://github.com/bullfrogsec/bullfrog/commit/ae7744ae4b3a6f8ffc2e49f501e30bf1a43d4671"},{"name":"https://github.com/bullfrogsec/bullfrog/releases/tag/v0.8.4","tags":["x_refsource_MISC"],"url":"https://github.com/bullfrogsec/bullfrog/releases/tag/v0.8.4"}],"affected":[{"vendor":"bullfrogsec","product":"bullfrog","versions":[{"version":"< 0.8.4","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-05-14T15:18:37.058Z"},"descriptions":[{"lang":"en","value":"Bullfrog is a GithHb Action to block unauthorized outbound traffic in GitHub workflows. Prior to version 0.8.4, using tcp breaks blocking and allows DNS exfiltration. This can result in sandbox bypass. Version 0.8.4 fixes the issue."}],"source":{"advisory":"GHSA-m32f-fjw2-37v3","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/bullfrogsec/bullfrog/security/advisories/GHSA-m32f-fjw2-37v3","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-14T15:42:37.896447Z","id":"CVE-2025-47775","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-14T15:42:42.206Z"}}]}}