Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14046: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GitHub Enterprise Server

0
High
VulnerabilityCVE-2025-14046cvecve-2025-14046cwe-79
Published: Thu Dec 11 2025 (12/11/2025, 17:52:05 UTC)
Source: CVE Database V5
Vendor/Project: GitHub
Product: Enterprise Server

Description

An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed user-supplied HTML to inject DOM elements with IDs that collided with server-initialized data islands. These collisions could overwrite or shadow critical application state objects used by certain Project views, leading to unintended server-side POST requests or other unauthorized backend interactions. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a privileged user to view crafted malicious content that includes conflicting HTML elements. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18.3, 3.17.9, 3.16.12, 3.15.16, and 3.14.21.

AI-Powered Analysis

AILast updated: 12/11/2025, 18:23:53 UTC

Technical Analysis

CVE-2025-14046 is a cross-site scripting (XSS) vulnerability classified under CWE-79 that affects GitHub Enterprise Server versions prior to 3.18.3, 3.17.9, 3.16.12, 3.15.16, and 3.14.21. The vulnerability stems from improper neutralization of user-supplied HTML input during web page generation, specifically allowing injection of DOM elements with IDs that collide with server-initialized data islands. These collisions cause overwriting or shadowing of critical application state objects used in certain Project views. As a result, attackers can manipulate the client-side DOM to trigger unintended server-side POST requests or unauthorized backend interactions. Exploitation requires the attacker to have access to the targeted GitHub Enterprise Server instance and to lure a privileged user into viewing maliciously crafted content containing conflicting HTML elements. The vulnerability does not require authentication or elevated privileges for the attacker but does require user interaction (viewing the malicious content). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality and integrity. No known exploits have been reported in the wild as of the publication date, but the potential impact on sensitive project data and workflows is significant. The vulnerability affects multiple major versions of GitHub Enterprise Server, a widely used platform for source code management and collaboration in enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2025-14046 can be substantial due to the widespread adoption of GitHub Enterprise Server in software development and DevOps workflows. Successful exploitation could lead to unauthorized modification or disclosure of sensitive project data, manipulation of project states, and potentially unauthorized backend operations that compromise the integrity and confidentiality of code repositories and related assets. This could disrupt development processes, introduce malicious code, or leak proprietary information. Given that privileged users must be tricked into viewing malicious content, targeted phishing or social engineering campaigns could be employed by attackers. The vulnerability's ability to cause server-side POST requests without proper authorization increases the risk of lateral movement or privilege escalation within the enterprise environment. The absence of known exploits in the wild provides a window for proactive mitigation, but organizations should act swiftly to prevent potential exploitation, especially those in regulated industries or with critical software supply chains in Europe.

Mitigation Recommendations

European organizations should immediately upgrade GitHub Enterprise Server to versions 3.18.3, 3.17.9, 3.16.12, 3.15.16, or 3.14.21 or later, where the vulnerability is patched. Until patching is complete, implement strict content security policies (CSP) to restrict the execution of untrusted scripts and reduce the risk of XSS exploitation. Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting this vulnerability. Enhance user awareness training focused on recognizing phishing and social engineering attempts that could deliver malicious content. Restrict access to GitHub Enterprise Server instances to trusted networks and users, minimizing exposure to untrusted actors. Monitor server logs and user activity for unusual POST requests or backend interactions that could indicate exploitation attempts. Consider deploying runtime application self-protection (RASP) solutions to detect and block anomalous DOM manipulations. Finally, review and harden project view configurations to limit the impact of DOM element collisions where feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_P
Date Reserved
2025-12-04T16:22:53.626Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b08b87d4c6f31f7be3ba9

Added to database: 12/11/2025, 6:08:56 PM

Last enriched: 12/11/2025, 6:23:53 PM

Last updated: 12/12/2025, 3:09:33 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats