CVE-2025-11578: CWE-59 Improper Link Resolution Before File Access ('Link Following') in GitHub Enterprise Server
A privilege escalation vulnerability was identified in GitHub Enterprise Server that allowed an authenticated Enterprise admin to gain root SSH access to the appliance by exploiting a symlink escape in pre-receive hook environments. By crafting a malicious repository and environment, an attacker could replace system binaries during hook cleanup and execute a payload that adds their own SSH key to the root user’s authorized keys—thereby granting themselves root SSH access to the server. To exploit this vulnerability, the attacker needed to have enterprise admin privileges. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.19, and was fixed in versions 3.14.20, 3.15.15, 3.16.11, 3.17.8, 3.18.2. This vulnerability was reported via the GitHub Bug Bounty program.
AI Analysis
Technical Summary
CVE-2025-11578 is a privilege escalation vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following') affecting GitHub Enterprise Server versions 3.14 through 3.18. The flaw arises in the handling of symbolic links within the pre-receive hook environment, a critical part of Git operations that run scripts before accepting pushed commits. An authenticated enterprise admin can craft a malicious repository and hook environment that exploits a symlink escape during the cleanup phase of the pre-receive hook. This escape enables the attacker to replace system binaries with malicious payloads. Upon execution, the payload adds the attacker’s SSH public key to the root user’s authorized_keys file, granting persistent root SSH access to the appliance. The attack requires enterprise admin privileges, which limits the initial attack surface but significantly elevates risk due to the high level of access gained. The vulnerability was responsibly disclosed via the GitHub Bug Bounty program and patched in versions 3.14.20, 3.15.15, 3.16.11, 3.17.8, and 3.18.2. The CVSS 4.0 score is 7.5 (high), reflecting network attack vector, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported, but the potential for root compromise makes this a critical patching priority for affected organizations.
Potential Impact
For European organizations using GitHub Enterprise Server, this vulnerability poses a significant risk of full system compromise if exploited. Root SSH access to the server allows attackers to manipulate repositories, inject malicious code, exfiltrate sensitive intellectual property, and disrupt development workflows. Given GitHub Enterprise Server’s role in managing source code and CI/CD pipelines, a successful attack could lead to widespread supply chain risks and operational downtime. The requirement for enterprise admin privileges reduces the likelihood of external attackers exploiting this directly but raises concerns about insider threats or compromised admin accounts. Organizations in sectors with stringent data protection regulations, such as finance, healthcare, and critical infrastructure, face heightened risks of regulatory non-compliance and reputational damage if this vulnerability is exploited. Additionally, the ability to persistently maintain root access could facilitate long-term espionage or sabotage campaigns targeting European enterprises.
Mitigation Recommendations
European organizations should immediately verify their GitHub Enterprise Server version and apply the patches released in versions 3.14.20, 3.15.15, 3.16.11, 3.17.8, or 3.18.2. If patching is not immediately feasible, restrict enterprise admin privileges to the minimum number of trusted personnel and enforce strong multi-factor authentication to reduce the risk of credential compromise. Implement rigorous monitoring of SSH authorized_keys files and system binaries for unauthorized changes. Conduct regular audits of pre-receive hook scripts and repository contents for suspicious symlink usage. Employ network segmentation to isolate GitHub Enterprise Servers from broader enterprise networks to limit lateral movement in case of compromise. Finally, maintain comprehensive logging and alerting on administrative actions within GitHub Enterprise Server to detect anomalous behavior promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-11578: CWE-59 Improper Link Resolution Before File Access ('Link Following') in GitHub Enterprise Server
Description
A privilege escalation vulnerability was identified in GitHub Enterprise Server that allowed an authenticated Enterprise admin to gain root SSH access to the appliance by exploiting a symlink escape in pre-receive hook environments. By crafting a malicious repository and environment, an attacker could replace system binaries during hook cleanup and execute a payload that adds their own SSH key to the root user’s authorized keys—thereby granting themselves root SSH access to the server. To exploit this vulnerability, the attacker needed to have enterprise admin privileges. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.19, and was fixed in versions 3.14.20, 3.15.15, 3.16.11, 3.17.8, 3.18.2. This vulnerability was reported via the GitHub Bug Bounty program.
AI-Powered Analysis
Technical Analysis
CVE-2025-11578 is a privilege escalation vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following') affecting GitHub Enterprise Server versions 3.14 through 3.18. The flaw arises in the handling of symbolic links within the pre-receive hook environment, a critical part of Git operations that run scripts before accepting pushed commits. An authenticated enterprise admin can craft a malicious repository and hook environment that exploits a symlink escape during the cleanup phase of the pre-receive hook. This escape enables the attacker to replace system binaries with malicious payloads. Upon execution, the payload adds the attacker’s SSH public key to the root user’s authorized_keys file, granting persistent root SSH access to the appliance. The attack requires enterprise admin privileges, which limits the initial attack surface but significantly elevates risk due to the high level of access gained. The vulnerability was responsibly disclosed via the GitHub Bug Bounty program and patched in versions 3.14.20, 3.15.15, 3.16.11, 3.17.8, and 3.18.2. The CVSS 4.0 score is 7.5 (high), reflecting network attack vector, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported, but the potential for root compromise makes this a critical patching priority for affected organizations.
Potential Impact
For European organizations using GitHub Enterprise Server, this vulnerability poses a significant risk of full system compromise if exploited. Root SSH access to the server allows attackers to manipulate repositories, inject malicious code, exfiltrate sensitive intellectual property, and disrupt development workflows. Given GitHub Enterprise Server’s role in managing source code and CI/CD pipelines, a successful attack could lead to widespread supply chain risks and operational downtime. The requirement for enterprise admin privileges reduces the likelihood of external attackers exploiting this directly but raises concerns about insider threats or compromised admin accounts. Organizations in sectors with stringent data protection regulations, such as finance, healthcare, and critical infrastructure, face heightened risks of regulatory non-compliance and reputational damage if this vulnerability is exploited. Additionally, the ability to persistently maintain root access could facilitate long-term espionage or sabotage campaigns targeting European enterprises.
Mitigation Recommendations
European organizations should immediately verify their GitHub Enterprise Server version and apply the patches released in versions 3.14.20, 3.15.15, 3.16.11, 3.17.8, or 3.18.2. If patching is not immediately feasible, restrict enterprise admin privileges to the minimum number of trusted personnel and enforce strong multi-factor authentication to reduce the risk of credential compromise. Implement rigorous monitoring of SSH authorized_keys files and system binaries for unauthorized changes. Conduct regular audits of pre-receive hook scripts and repository contents for suspicious symlink usage. Employ network segmentation to isolate GitHub Enterprise Servers from broader enterprise networks to limit lateral movement in case of compromise. Finally, maintain comprehensive logging and alerting on administrative actions within GitHub Enterprise Server to detect anomalous behavior promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_P
- Date Reserved
- 2025-10-10T07:00:07.064Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69126c0c6b3b7718db092a71
Added to database: 11/10/2025, 10:49:48 PM
Last enriched: 12/2/2025, 8:27:41 PM
Last updated: 12/26/2025, 7:50:34 AM
Views: 133
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59888: CWE-428 Unquoted Search Path or Element in Eaton UPS Companion software
MediumCVE-2025-59887: CWE-427 Uncontrolled Search Path Element in Eaton Eaton UPS Companion Software
HighCVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
HighCVE-2025-62578: CWE-319 Cleartext Transmission of Sensitive Information in Delta Electronics DVP-12SE
HighCVE-2025-8075: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.