Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-68429

Опубликовано: 17 дек. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a .env file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the storybook build command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run storybook build directly or indirectly) in a directory that contains a .env file (including variants like .env.local) and publish the built Storybook to the web. Storybooks built without a .env file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than .env files. Storybook runtime environments (i.e. storybook dev) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via .env files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with STORYBOOK_ or use the env property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

A flaw was found in Storybook, a tool for building user interface components. This vulnerability can lead to the unintended exposure of sensitive information. When Storybook is built in a directory containing a .env file and then published online, environment variables from that file may be included in the publicly accessible build artifacts. This allows anyone with access to the published Storybook to view these potentially confidential variables.

Отчет

This vulnerability is rated Important for Red Hat as it can lead to the unintended exposure of sensitive environment variables. This occurs when a Storybook project is built using the storybook build command in a directory containing a .env file, and the resulting bundle is subsequently published to a web-accessible location. Storybook instances built without .env files or run in development mode (storybook dev) are not affected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Node HealthCheck Operatorworkload-availability/node-healthcheck-must-gather-rhel9Not affected
Node HealthCheck Operatorworkload-availability/node-healthcheck-operator-bundleNot affected
Node HealthCheck Operatorworkload-availability/node-healthcheck-rhel9-operatorNot affected
Node HealthCheck Operatorworkload-availability/node-remediation-console-rhel9Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-grafana-rhel9Affected
Red Hat Enterprise Linux 10grafanaNot affected
Red Hat Enterprise Linux 9grafanaNot affected
streams for Apache Kafka 2com.github.streamshub-consoleAffected
streams for Apache Kafka 3com.github.streamshub-consoleAffected
Multicluster Global Hub 1.5.4multicluster-globalhub/multicluster-globalhub-grafana-rhel9FixedRHSA-2026:225609.02.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-538
https://bugzilla.redhat.com/show_bug.cgi?id=2423460Storybook: Storybook: Information disclosure via unexpected bundling of environment variables

EPSS

Процентиль: 5%
0.00018
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
4 месяца назад

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform en

CVSS3: 7.3
github
4 месяца назад

Storybook manager bundle may expose environment variables during build

EPSS

Процентиль: 5%
0.00018
Низкий

7.5 High

CVSS3