CVE-2025-48064: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in desktop desktop
GitHub Desktop is an open-source, Electron-based GitHub app designed for git development. Prior to version 3.4.20-beta3, an attacker convincing a user to view a file in a commit of their making in the history view can cause information disclosure by means of Git attempting to access a network share. This affects GitHub Desktop users on Windows that view malicious commits in the history view. macOS users are not affected. When viewing a file diff in the history view GitHub Desktop will call `git log` or `git diff` with the object id (SHA) of the commit, the name of the file, and the old name of the file if the file has been renamed. As a security precaution Git will attempt to fully resolve the old and new path via `realpath`, traversing symlinks, to ensure that the resolved paths reside within the repository working directory. This can lead to Git attempting to access a path that resides on a network share (UNC path) and in doing so Windows will attempt to perform NTLM authentication which passes information such as the computer name, the currently signed in (Windows) user name, and an NTLM hash. GitHub Desktop 3.4.20 and later fix this vulnerability. The beta channel includes the fix in 3.4.20-beta3. As a workaround to use until upgrading is possible, only browse commits in the history view that comes from trusted sources.
AI Analysis
Technical Summary
CVE-2025-48064 is a vulnerability affecting GitHub Desktop, an open-source Electron-based application used for Git version control operations. The flaw exists in versions prior to 3.4.20-beta3 on Windows platforms. When a user views a file in a commit within the history view, GitHub Desktop internally calls Git commands such as `git log` or `git diff` with commit object IDs and file names. As part of its operation, Git attempts to resolve file paths fully using `realpath`, which traverses symbolic links to ensure paths remain within the repository directory. However, if a malicious commit contains file paths that resolve to network shares (UNC paths), Git will attempt to access these shares. On Windows, this triggers an automatic NTLM authentication attempt, leaking sensitive information including the computer name, the logged-in Windows username, and an NTLM hash. This exposure occurs without requiring elevated privileges but does require user interaction (viewing the malicious commit). macOS users are not affected due to differences in path resolution and authentication mechanisms. The vulnerability is classified as CWE-200 (Exposure of Sensitive Information) and has a CVSS v3.1 score of 3.3 (low severity). The issue is fixed in GitHub Desktop version 3.4.20 and later, including the beta 3.4.20-beta3. Until patched, users are advised to only browse commits from trusted sources to avoid triggering the vulnerability. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, this vulnerability poses a limited but non-negligible risk. The exposure of NTLM hashes and user/computer names could facilitate further lateral movement or credential replay attacks within corporate networks if an attacker can trick users into viewing malicious commits. While the initial impact is information disclosure only, leaked NTLM hashes can be used in relay or brute-force attacks to escalate privileges or access sensitive resources. Organizations with Windows-based developers using GitHub Desktop are at risk, especially if they handle code from untrusted or external contributors. The risk is mitigated by the low CVSS score and requirement for user interaction, but targeted attacks against software development teams or supply chain compromise scenarios could leverage this vulnerability to gain footholds in networks. The vulnerability does not affect macOS users, reducing the overall impact in mixed-OS environments. Since no known exploits are reported, the immediate threat level is low, but the potential for credential exposure warrants prompt remediation in sensitive environments.
Mitigation Recommendations
1. Upgrade GitHub Desktop to version 3.4.20 or later as soon as possible to apply the official fix. 2. Until upgrading, restrict developers from viewing commits from untrusted or unknown sources in the history view to avoid triggering the vulnerability. 3. Implement network segmentation and monitoring to detect unusual NTLM authentication attempts or SMB traffic from developer workstations. 4. Enforce the use of multi-factor authentication (MFA) and strong credential policies to reduce the risk from leaked NTLM hashes. 5. Educate development teams about the risks of opening commits from unknown contributors and encourage verification of code sources. 6. Consider disabling automatic network share access or NTLM authentication on developer machines if feasible, using Group Policy or local security policies. 7. Monitor logs for suspicious authentication attempts that may indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2025-48064: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in desktop desktop
Description
GitHub Desktop is an open-source, Electron-based GitHub app designed for git development. Prior to version 3.4.20-beta3, an attacker convincing a user to view a file in a commit of their making in the history view can cause information disclosure by means of Git attempting to access a network share. This affects GitHub Desktop users on Windows that view malicious commits in the history view. macOS users are not affected. When viewing a file diff in the history view GitHub Desktop will call `git log` or `git diff` with the object id (SHA) of the commit, the name of the file, and the old name of the file if the file has been renamed. As a security precaution Git will attempt to fully resolve the old and new path via `realpath`, traversing symlinks, to ensure that the resolved paths reside within the repository working directory. This can lead to Git attempting to access a path that resides on a network share (UNC path) and in doing so Windows will attempt to perform NTLM authentication which passes information such as the computer name, the currently signed in (Windows) user name, and an NTLM hash. GitHub Desktop 3.4.20 and later fix this vulnerability. The beta channel includes the fix in 3.4.20-beta3. As a workaround to use until upgrading is possible, only browse commits in the history view that comes from trusted sources.
AI-Powered Analysis
Technical Analysis
CVE-2025-48064 is a vulnerability affecting GitHub Desktop, an open-source Electron-based application used for Git version control operations. The flaw exists in versions prior to 3.4.20-beta3 on Windows platforms. When a user views a file in a commit within the history view, GitHub Desktop internally calls Git commands such as `git log` or `git diff` with commit object IDs and file names. As part of its operation, Git attempts to resolve file paths fully using `realpath`, which traverses symbolic links to ensure paths remain within the repository directory. However, if a malicious commit contains file paths that resolve to network shares (UNC paths), Git will attempt to access these shares. On Windows, this triggers an automatic NTLM authentication attempt, leaking sensitive information including the computer name, the logged-in Windows username, and an NTLM hash. This exposure occurs without requiring elevated privileges but does require user interaction (viewing the malicious commit). macOS users are not affected due to differences in path resolution and authentication mechanisms. The vulnerability is classified as CWE-200 (Exposure of Sensitive Information) and has a CVSS v3.1 score of 3.3 (low severity). The issue is fixed in GitHub Desktop version 3.4.20 and later, including the beta 3.4.20-beta3. Until patched, users are advised to only browse commits from trusted sources to avoid triggering the vulnerability. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, this vulnerability poses a limited but non-negligible risk. The exposure of NTLM hashes and user/computer names could facilitate further lateral movement or credential replay attacks within corporate networks if an attacker can trick users into viewing malicious commits. While the initial impact is information disclosure only, leaked NTLM hashes can be used in relay or brute-force attacks to escalate privileges or access sensitive resources. Organizations with Windows-based developers using GitHub Desktop are at risk, especially if they handle code from untrusted or external contributors. The risk is mitigated by the low CVSS score and requirement for user interaction, but targeted attacks against software development teams or supply chain compromise scenarios could leverage this vulnerability to gain footholds in networks. The vulnerability does not affect macOS users, reducing the overall impact in mixed-OS environments. Since no known exploits are reported, the immediate threat level is low, but the potential for credential exposure warrants prompt remediation in sensitive environments.
Mitigation Recommendations
1. Upgrade GitHub Desktop to version 3.4.20 or later as soon as possible to apply the official fix. 2. Until upgrading, restrict developers from viewing commits from untrusted or unknown sources in the history view to avoid triggering the vulnerability. 3. Implement network segmentation and monitoring to detect unusual NTLM authentication attempts or SMB traffic from developer workstations. 4. Enforce the use of multi-factor authentication (MFA) and strong credential policies to reduce the risk from leaked NTLM hashes. 5. Educate development teams about the risks of opening commits from unknown contributors and encourage verification of code sources. 6. Consider disabling automatic network share access or NTLM authentication on developer machines if feasible, using Group Policy or local security policies. 7. Monitor logs for suspicious authentication attempts that may indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-15T16:06:40.941Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682e12f6c4522896dcc6934f
Added to database: 5/21/2025, 5:52:54 PM
Last enriched: 7/7/2025, 1:41:36 PM
Last updated: 8/15/2025, 11:12:00 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.