Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11892: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GitHub Enterprise Server

0
High
VulnerabilityCVE-2025-11892cvecve-2025-11892cwe-79
Published: Mon Nov 10 2025 (11/10/2025, 22:43:41 UTC)
Source: CVE Database V5
Vendor/Project: GitHub
Product: Enterprise Server

Description

An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allows DOM-based cross-site scripting via Issues search label filter that could lead to privilege escalation and unauthorized workflow triggers. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a user, while operating in sudo mode, to click on a crafted malicious link to perform actions that require elevated privileges. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18.1, 3.17.7, 3.16.10, 3.15.14, 3.14.19.

AI-Powered Analysis

AILast updated: 11/17/2025, 23:05:36 UTC

Technical Analysis

CVE-2025-11892 is a DOM-based cross-site scripting vulnerability categorized under CWE-79, found in GitHub Enterprise Server versions prior to 3.18.1, 3.17.7, 3.16.10, 3.15.14, and 3.14.19. The flaw stems from improper neutralization of input during web page generation, specifically in the Issues search label filter functionality. An attacker with access to the GitHub Enterprise Server instance can craft a malicious URL that exploits this vulnerability. When a user operating in sudo mode clicks this crafted link, the embedded script executes in the context of the victim’s browser, enabling unauthorized actions such as privilege escalation and triggering workflows that require elevated permissions. The vulnerability does not require prior authentication but does require user interaction (clicking the malicious link). The CVSS v4.0 score is 8.6 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction, and high impact on confidentiality and integrity. Although no exploits have been observed in the wild, the potential for misuse in environments where GitHub Enterprise Server is used for critical development workflows is significant. The vulnerability affects multiple major versions, indicating a broad impact across deployments. Patching to the fixed versions is the primary remediation step, as no mitigations are listed in the advisory.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the security of their software development lifecycle and intellectual property. GitHub Enterprise Server is widely used by enterprises to manage source code, workflows, and collaboration. Exploitation could lead to unauthorized code changes, exposure of sensitive data, and disruption of automated workflows, potentially compromising product integrity and compliance with data protection regulations such as GDPR. The requirement for user interaction and sudo mode operation means insider threat vectors or targeted phishing campaigns could be leveraged. The impact extends to confidentiality, as attackers could access sensitive project information, and integrity, as unauthorized workflow triggers could alter code or deployment processes. Availability impact is limited but could occur if workflows are manipulated to disrupt operations. Given the critical role of GitHub Enterprise Server in many European organizations’ DevOps pipelines, this vulnerability could have cascading effects on software delivery and security assurance.

Mitigation Recommendations

European organizations should immediately identify all GitHub Enterprise Server instances and verify their versions. Upgrading to the patched versions 3.18.1, 3.17.7, 3.16.10, 3.15.14, or 3.14.19 is essential to remediate the vulnerability. Until patching is complete, organizations should restrict sudo mode usage and educate users about the risks of clicking untrusted links, especially within the GitHub environment. Implementing strict access controls and monitoring for unusual workflow triggers or privilege escalations can help detect exploitation attempts. Network-level protections such as web filtering to block known malicious URLs and enhanced logging of user actions in GitHub Enterprise Server can provide additional defense layers. Regular security awareness training focused on phishing and social engineering can reduce the likelihood of successful user interaction exploitation. Finally, organizations should review and harden their GitHub Enterprise Server configurations to minimize attack surface exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_P
Date Reserved
2025-10-16T19:22:23.359Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69126c0c6b3b7718db092a78

Added to database: 11/10/2025, 10:49:48 PM

Last enriched: 11/17/2025, 11:05:36 PM

Last updated: 12/26/2025, 7:57:09 AM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats