CVE-2025-54956
Linux Debian vulnerability analysis and mitigation

Overview

The gh package before version 1.5.0 for R contains a security vulnerability identified as CVE-2025-54956. The vulnerability was discovered and disclosed on August 3, 2025, affecting the R programming language package gh. The issue involves the exposure of sensitive information through HTTP response data structures that include Authorization headers from corresponding HTTP requests (NVD, Debian Tracker).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 3.2 (LOW) with the vector string CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N. The technical nature of the vulnerability involves the gh package storing HTTP request headers, including Authorization headers, within the response data structure. This implementation could potentially expose sensitive authentication information. The vulnerability is classified under CWE-669 (Incorrect Resource Transfer Between Spheres) (NVD).

Impact

The primary impact of this vulnerability is the potential exposure of sensitive authentication information contained in Authorization headers. If an attacker gains access to the stored response data structure, they could potentially extract authentication tokens or credentials. This is particularly concerning in scenarios where results are cached and inadvertently committed to version control systems (GitHub Issue).

Mitigation and workarounds

The vulnerability has been fixed in gh package version 1.5.0. The fix involves modifying the package to no longer save request headers in the returned object. Users who previously relied on header information for pagination functions (ghnext(), ghprev(), ghfirst(), or ghlast()) will need to explicitly pass .token and/or .send_headers parameters to these functions (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67726HIGH7.5
  • Linux DebianLinux Debian
  • python-tornado
NoNoDec 12, 2025
CVE-2025-67725HIGH7.5
  • Linux DebianLinux Debian
  • python-tornado
NoNoDec 12, 2025
CVE-2025-67724MEDIUM5.4
  • Linux DebianLinux Debian
  • python-tornado
NoNoDec 12, 2025
CVE-2025-64702MEDIUM5.3
  • SyncthingSyncthing
  • buf
NoYesDec 11, 2025
CVE-2025-40345N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management