CVE-2025-11892: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GitHub Enterprise Server
An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allows DOM-based cross-site scripting via Issues search label filter that could lead to privilege escalation and unauthorized workflow triggers. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a user, while operating in sudo mode, to click on a crafted malicious link to perform actions that require elevated privileges. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18.1, 3.17.7, 3.16.10, 3.15.14, 3.14.19.
AI Analysis
Technical Summary
CVE-2025-11892 is a DOM-based cross-site scripting vulnerability categorized under CWE-79, found in GitHub Enterprise Server versions prior to 3.18.1, 3.17.7, 3.16.10, 3.15.14, and 3.14.19. The flaw stems from improper neutralization of input during web page generation, specifically in the Issues search label filter functionality. An attacker with access to the GitHub Enterprise Server instance can craft a malicious URL that exploits this vulnerability. When a user operating in sudo mode clicks this crafted link, the embedded script executes in the context of the victim’s browser, enabling unauthorized actions such as privilege escalation and triggering workflows that require elevated permissions. The vulnerability does not require prior authentication but does require user interaction (clicking the malicious link). The CVSS v4.0 score is 8.6 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction, and high impact on confidentiality and integrity. Although no exploits have been observed in the wild, the potential for misuse in environments where GitHub Enterprise Server is used for critical development workflows is significant. The vulnerability affects multiple major versions, indicating a broad impact across deployments. Patching to the fixed versions is the primary remediation step, as no mitigations are listed in the advisory.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security of their software development lifecycle and intellectual property. GitHub Enterprise Server is widely used by enterprises to manage source code, workflows, and collaboration. Exploitation could lead to unauthorized code changes, exposure of sensitive data, and disruption of automated workflows, potentially compromising product integrity and compliance with data protection regulations such as GDPR. The requirement for user interaction and sudo mode operation means insider threat vectors or targeted phishing campaigns could be leveraged. The impact extends to confidentiality, as attackers could access sensitive project information, and integrity, as unauthorized workflow triggers could alter code or deployment processes. Availability impact is limited but could occur if workflows are manipulated to disrupt operations. Given the critical role of GitHub Enterprise Server in many European organizations’ DevOps pipelines, this vulnerability could have cascading effects on software delivery and security assurance.
Mitigation Recommendations
European organizations should immediately identify all GitHub Enterprise Server instances and verify their versions. Upgrading to the patched versions 3.18.1, 3.17.7, 3.16.10, 3.15.14, or 3.14.19 is essential to remediate the vulnerability. Until patching is complete, organizations should restrict sudo mode usage and educate users about the risks of clicking untrusted links, especially within the GitHub environment. Implementing strict access controls and monitoring for unusual workflow triggers or privilege escalations can help detect exploitation attempts. Network-level protections such as web filtering to block known malicious URLs and enhanced logging of user actions in GitHub Enterprise Server can provide additional defense layers. Regular security awareness training focused on phishing and social engineering can reduce the likelihood of successful user interaction exploitation. Finally, organizations should review and harden their GitHub Enterprise Server configurations to minimize attack surface exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-11892: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GitHub Enterprise Server
Description
An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allows DOM-based cross-site scripting via Issues search label filter that could lead to privilege escalation and unauthorized workflow triggers. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a user, while operating in sudo mode, to click on a crafted malicious link to perform actions that require elevated privileges. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18.1, 3.17.7, 3.16.10, 3.15.14, 3.14.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-11892 is a DOM-based cross-site scripting vulnerability categorized under CWE-79, found in GitHub Enterprise Server versions prior to 3.18.1, 3.17.7, 3.16.10, 3.15.14, and 3.14.19. The flaw stems from improper neutralization of input during web page generation, specifically in the Issues search label filter functionality. An attacker with access to the GitHub Enterprise Server instance can craft a malicious URL that exploits this vulnerability. When a user operating in sudo mode clicks this crafted link, the embedded script executes in the context of the victim’s browser, enabling unauthorized actions such as privilege escalation and triggering workflows that require elevated permissions. The vulnerability does not require prior authentication but does require user interaction (clicking the malicious link). The CVSS v4.0 score is 8.6 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction, and high impact on confidentiality and integrity. Although no exploits have been observed in the wild, the potential for misuse in environments where GitHub Enterprise Server is used for critical development workflows is significant. The vulnerability affects multiple major versions, indicating a broad impact across deployments. Patching to the fixed versions is the primary remediation step, as no mitigations are listed in the advisory.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security of their software development lifecycle and intellectual property. GitHub Enterprise Server is widely used by enterprises to manage source code, workflows, and collaboration. Exploitation could lead to unauthorized code changes, exposure of sensitive data, and disruption of automated workflows, potentially compromising product integrity and compliance with data protection regulations such as GDPR. The requirement for user interaction and sudo mode operation means insider threat vectors or targeted phishing campaigns could be leveraged. The impact extends to confidentiality, as attackers could access sensitive project information, and integrity, as unauthorized workflow triggers could alter code or deployment processes. Availability impact is limited but could occur if workflows are manipulated to disrupt operations. Given the critical role of GitHub Enterprise Server in many European organizations’ DevOps pipelines, this vulnerability could have cascading effects on software delivery and security assurance.
Mitigation Recommendations
European organizations should immediately identify all GitHub Enterprise Server instances and verify their versions. Upgrading to the patched versions 3.18.1, 3.17.7, 3.16.10, 3.15.14, or 3.14.19 is essential to remediate the vulnerability. Until patching is complete, organizations should restrict sudo mode usage and educate users about the risks of clicking untrusted links, especially within the GitHub environment. Implementing strict access controls and monitoring for unusual workflow triggers or privilege escalations can help detect exploitation attempts. Network-level protections such as web filtering to block known malicious URLs and enhanced logging of user actions in GitHub Enterprise Server can provide additional defense layers. Regular security awareness training focused on phishing and social engineering can reduce the likelihood of successful user interaction exploitation. Finally, organizations should review and harden their GitHub Enterprise Server configurations to minimize attack surface exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_P
- Date Reserved
- 2025-10-16T19:22:23.359Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69126c0c6b3b7718db092a78
Added to database: 11/10/2025, 10:49:48 PM
Last enriched: 11/17/2025, 11:05:36 PM
Last updated: 12/26/2025, 7:57:09 AM
Views: 136
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59888: CWE-428 Unquoted Search Path or Element in Eaton UPS Companion software
MediumCVE-2025-59887: CWE-427 Uncontrolled Search Path Element in Eaton Eaton UPS Companion Software
HighCVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
HighCVE-2025-62578: CWE-319 Cleartext Transmission of Sensitive Information in Delta Electronics DVP-12SE
HighCVE-2025-8075: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.