CVE-2021-21423
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability CVE-2021-21423 affects projen, a project generation tool that synthesizes project configuration files. The issue was discovered in versions >= 0.6.0 and < 0.16.41, and was disclosed in April 2021. The vulnerability specifically impacts the rebuild-bot workflow functionality in NodeProject project types and its derivatives (GitHub Advisory).

Technical details

The vulnerability exists in the rebuild-bot workflow (.github/workflows/rebuild-bot.yml) which is triggered by comments including '@projen rebuild' on pull requests. The workflow executes with a GITHUBTOKEN belonging to the target repository rather than the fork's repository. This differs from typical pullrequest event workflows, which execute with tokens from the source repository (GitHub Advisory).

Impact

In repositories without branch protection on their default branch, the vulnerability could allow unauthorized users to gain access to repository secrets (such as NPM tokens) and potentially make unauthorized modifications to the repository. The issue is particularly concerning for repositories that contain sensitive configuration or deployment credentials (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 0.16.41 by removing the issue_comment trigger from the workflow. Version 0.17.0 completely removed the rebuild-bot.yml workflow. For users unable to upgrade, an alternative mitigation is to remove the .github/workflows/rebuild-bot.yml file and add it to their .gitignore file via projenrc.js (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55182CRITICAL10
  • JavaScriptJavaScript
  • react
NoYesDec 03, 2025
CVE-2025-66401CRITICAL9.8
  • JavaScriptJavaScript
  • mcp-watch
NoNoDec 01, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • @angular/compiler
NoYesDec 01, 2025
CVE-2025-66415MEDIUM6.9
  • JavaScriptJavaScript
  • @fastify/reply-from
NoYesDec 01, 2025
CVE-2025-66405MEDIUM6.9
  • JavaScriptJavaScript
  • @portkey-ai/gateway
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management