CVE-2025-61926: Allstar Reviewbot has Authentication Bypass via Hard-coded Webhook Secret
(updated )
A vulnerability in Allstar’s Reviewbot component caused inbound webhook requests to be validated against a hard-coded, shared secret:
The value used for the secret token was compiled into the Allstar binary and could not be configured at runtime. In practice, this meant that every deployment using Reviewbot would validate requests with the same secret unless the operator modified source code and rebuilt the component - an expectation that is not documented and is easy to miss. While Reviewbot is not commonly enabled in standard Allstar setups, we are issuing this advisory to reach any environments where it may have been deployed.
References
- github.com/advisories/GHSA-33f4-mjch-7fpr
- github.com/ossf/allstar
- github.com/ossf/allstar/blob/294ae985cc2facd0918e8d820e4196021aa0b914/pkg/reviewbot/reviewbot.go
- github.com/ossf/allstar/commit/e004ecb540d63ca6f5b1689b41af6c0040a82c73
- github.com/ossf/allstar/pull/713
- github.com/ossf/allstar/security/advisories/GHSA-33f4-mjch-7fpr
- nvd.nist.gov/vuln/detail/CVE-2025-61926
- pkg.go.dev/vuln/GO-2025-4018
Code Behaviors & Features
Detect and mitigate CVE-2025-61926 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →