CVE-2022-23738: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in GitHub GitHub Enterprise Server
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
AI Analysis
Technical Summary
CVE-2022-23738 is a medium-severity vulnerability affecting GitHub Enterprise Server versions prior to 3.6. It arises from an improper cache key implementation that allows unauthorized exposure of sensitive information. Specifically, an attacker who is already authorized on the GitHub Enterprise Server instance and capable of creating a public repository can exploit this flaw. The attack requires the site administrator to visit a specially crafted URL, which triggers the vulnerability and results in unauthorized access to private repository files through a public repository. This vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The flaw does not allow modification or deletion of data (integrity is not impacted), nor does it affect availability, but it compromises confidentiality by leaking private repository contents. The vulnerability was fixed in GitHub Enterprise Server versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. Exploitation requires low attack complexity (AC:L), network access (AV:N), and privileges (PR:L) but also requires user interaction (UI:R) from a site administrator. No known exploits are currently reported in the wild, and the vulnerability was responsibly disclosed via the GitHub Bug Bounty program.
Potential Impact
For European organizations using GitHub Enterprise Server, this vulnerability poses a significant confidentiality risk. Private repositories often contain sensitive intellectual property, proprietary code, or confidential business information. Unauthorized exposure could lead to intellectual property theft, competitive disadvantage, or regulatory compliance violations, especially under GDPR where data protection is stringent. Since exploitation requires an authorized user with repository creation rights and a site administrator's interaction, insider threats or compromised accounts could leverage this vulnerability. The impact is particularly critical for organizations with strict data governance and those in regulated sectors such as finance, healthcare, and government. Although availability and integrity are not affected, the breach of confidentiality alone can cause reputational damage and financial loss. The absence of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks.
Mitigation Recommendations
European organizations should immediately verify their GitHub Enterprise Server version and upgrade to the patched releases (3.2.20, 3.3.15, 3.4.10, 3.5.7, or 3.6.3) to remediate this vulnerability. Additionally, organizations should audit user permissions to ensure that only trusted personnel have repository creation rights and site administrator privileges. Implement strict access controls and monitor for unusual activities, such as unexpected public repository creations or suspicious URL visits by administrators. Employ multi-factor authentication (MFA) for all privileged accounts to reduce the risk of account compromise. Conduct regular security awareness training to educate administrators about phishing and social engineering risks that could lead to visiting malicious URLs. Finally, review and enhance logging and alerting mechanisms to detect exploitation attempts promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-23738: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in GitHub GitHub Enterprise Server
Description
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
AI-Powered Analysis
Technical Analysis
CVE-2022-23738 is a medium-severity vulnerability affecting GitHub Enterprise Server versions prior to 3.6. It arises from an improper cache key implementation that allows unauthorized exposure of sensitive information. Specifically, an attacker who is already authorized on the GitHub Enterprise Server instance and capable of creating a public repository can exploit this flaw. The attack requires the site administrator to visit a specially crafted URL, which triggers the vulnerability and results in unauthorized access to private repository files through a public repository. This vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The flaw does not allow modification or deletion of data (integrity is not impacted), nor does it affect availability, but it compromises confidentiality by leaking private repository contents. The vulnerability was fixed in GitHub Enterprise Server versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. Exploitation requires low attack complexity (AC:L), network access (AV:N), and privileges (PR:L) but also requires user interaction (UI:R) from a site administrator. No known exploits are currently reported in the wild, and the vulnerability was responsibly disclosed via the GitHub Bug Bounty program.
Potential Impact
For European organizations using GitHub Enterprise Server, this vulnerability poses a significant confidentiality risk. Private repositories often contain sensitive intellectual property, proprietary code, or confidential business information. Unauthorized exposure could lead to intellectual property theft, competitive disadvantage, or regulatory compliance violations, especially under GDPR where data protection is stringent. Since exploitation requires an authorized user with repository creation rights and a site administrator's interaction, insider threats or compromised accounts could leverage this vulnerability. The impact is particularly critical for organizations with strict data governance and those in regulated sectors such as finance, healthcare, and government. Although availability and integrity are not affected, the breach of confidentiality alone can cause reputational damage and financial loss. The absence of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks.
Mitigation Recommendations
European organizations should immediately verify their GitHub Enterprise Server version and upgrade to the patched releases (3.2.20, 3.3.15, 3.4.10, 3.5.7, or 3.6.3) to remediate this vulnerability. Additionally, organizations should audit user permissions to ensure that only trusted personnel have repository creation rights and site administrator privileges. Implement strict access controls and monitor for unusual activities, such as unexpected public repository creations or suspicious URL visits by administrators. Employ multi-factor authentication (MFA) for all privileged accounts to reduce the risk of account compromise. Conduct regular security awareness training to educate administrators about phishing and social engineering risks that could lead to visiting malicious URLs. Finally, review and enhance logging and alerting mechanisms to detect exploitation attempts promptly.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_P
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda738
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/5/2025, 6:42:46 PM
Last updated: 2/7/2026, 2:39:13 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.