CVE-2022-23737: CWE-269 in GitHub GitHub Enterprise Server
An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.7 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
AI Analysis
Technical Summary
CVE-2022-23737 is an improper privilege management vulnerability (CWE-269) identified in GitHub Enterprise Server versions prior to 3.7. The flaw allows users who have been granted write permissions on an organization's repository to create or delete pages via the API, actions that should be restricted to users with higher privileges. This vulnerability arises from insufficient enforcement of privilege checks within the API endpoints responsible for managing pages, enabling users with lower privileges to perform unauthorized modifications. Exploitation requires that the attacker already has write access to a repository, meaning the attacker must be an insider or a compromised user with elevated repository permissions. The vulnerability does not require user interaction beyond API calls and can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). The vulnerability was fixed in GitHub Enterprise Server versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. No known exploits in the wild have been reported, and the issue was responsibly disclosed via GitHub's Bug Bounty program. The vulnerability primarily affects organizations using on-premises or self-hosted GitHub Enterprise Server instances, which are commonly deployed by enterprises requiring strict control over their source code and development workflows.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their software development lifecycle. Unauthorized creation or deletion of pages via the API could lead to misinformation, disruption of documentation, or manipulation of project-related content that may mislead developers or stakeholders. While the vulnerability does not impact confidentiality or availability directly, the integrity compromise could facilitate further social engineering or supply chain attacks if attackers manipulate project documentation or pages that developers rely on. Organizations with strict compliance requirements, such as those in finance, healthcare, or critical infrastructure sectors, could face regulatory scrutiny if such unauthorized changes lead to operational issues or data mishandling. The requirement that attackers have write access limits the attack surface to insiders or compromised accounts, but given that many organizations grant write permissions to multiple developers or third-party collaborators, the risk remains significant. Additionally, the vulnerability could be leveraged in targeted attacks against high-value European organizations that use GitHub Enterprise Server extensively for internal development, especially those with complex multi-team repositories and automated workflows relying on page content.
Mitigation Recommendations
Beyond applying the official patches to upgrade GitHub Enterprise Server to versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, or 3.6.3 and later, organizations should implement the following specific mitigations: 1) Conduct a thorough audit of repository permissions to ensure that write access is granted only to trusted users and minimize the number of users with such privileges. 2) Implement strict access controls and role-based access management to segregate duties and limit API access scopes where possible. 3) Enable and monitor detailed API usage logs to detect unusual page creation or deletion activities, especially from accounts with write permissions. 4) Use multi-factor authentication (MFA) for all users with write access to reduce the risk of account compromise. 5) Regularly review and validate repository page content changes, possibly integrating automated alerts or workflows that flag unexpected modifications. 6) Educate development teams about the risks of privilege misuse and encourage reporting of suspicious activities. 7) If feasible, restrict API access via network controls or IP allowlists to reduce exposure. These measures, combined with patching, will reduce the likelihood and impact of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2022-23737: CWE-269 in GitHub GitHub Enterprise Server
Description
An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.7 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
AI-Powered Analysis
Technical Analysis
CVE-2022-23737 is an improper privilege management vulnerability (CWE-269) identified in GitHub Enterprise Server versions prior to 3.7. The flaw allows users who have been granted write permissions on an organization's repository to create or delete pages via the API, actions that should be restricted to users with higher privileges. This vulnerability arises from insufficient enforcement of privilege checks within the API endpoints responsible for managing pages, enabling users with lower privileges to perform unauthorized modifications. Exploitation requires that the attacker already has write access to a repository, meaning the attacker must be an insider or a compromised user with elevated repository permissions. The vulnerability does not require user interaction beyond API calls and can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). The vulnerability was fixed in GitHub Enterprise Server versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. No known exploits in the wild have been reported, and the issue was responsibly disclosed via GitHub's Bug Bounty program. The vulnerability primarily affects organizations using on-premises or self-hosted GitHub Enterprise Server instances, which are commonly deployed by enterprises requiring strict control over their source code and development workflows.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their software development lifecycle. Unauthorized creation or deletion of pages via the API could lead to misinformation, disruption of documentation, or manipulation of project-related content that may mislead developers or stakeholders. While the vulnerability does not impact confidentiality or availability directly, the integrity compromise could facilitate further social engineering or supply chain attacks if attackers manipulate project documentation or pages that developers rely on. Organizations with strict compliance requirements, such as those in finance, healthcare, or critical infrastructure sectors, could face regulatory scrutiny if such unauthorized changes lead to operational issues or data mishandling. The requirement that attackers have write access limits the attack surface to insiders or compromised accounts, but given that many organizations grant write permissions to multiple developers or third-party collaborators, the risk remains significant. Additionally, the vulnerability could be leveraged in targeted attacks against high-value European organizations that use GitHub Enterprise Server extensively for internal development, especially those with complex multi-team repositories and automated workflows relying on page content.
Mitigation Recommendations
Beyond applying the official patches to upgrade GitHub Enterprise Server to versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, or 3.6.3 and later, organizations should implement the following specific mitigations: 1) Conduct a thorough audit of repository permissions to ensure that write access is granted only to trusted users and minimize the number of users with such privileges. 2) Implement strict access controls and role-based access management to segregate duties and limit API access scopes where possible. 3) Enable and monitor detailed API usage logs to detect unusual page creation or deletion activities, especially from accounts with write permissions. 4) Use multi-factor authentication (MFA) for all users with write access to reduce the risk of account compromise. 5) Regularly review and validate repository page content changes, possibly integrating automated alerts or workflows that flag unexpected modifications. 6) Educate development teams about the risks of privilege misuse and encourage reporting of suspicious activities. 7) If feasible, restrict API access via network controls or IP allowlists to reduce exposure. These measures, combined with patching, will reduce the likelihood and impact of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_P
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf1232
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/24/2025, 4:11:41 AM
Last updated: 7/30/2025, 5:11:20 AM
Views: 13
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.