CVE-2025-67844: CWE-425 Direct Request ('Forced Browsing') in Mintlify Mintlify Platform
The GitHub Integration API in Mintlify Platform before 2025-11-15 allows remote attackers to obtain sensitive repository metadata via the repository owner and name fields. It fails to validate that the repository owner and name fields provided during configuration belong to the specific GitHub App Installation ID associated with the user's organization.
AI Analysis
Technical Summary
CVE-2025-67844 is a vulnerability classified under CWE-425 (Direct Request or Forced Browsing) affecting the Mintlify Platform's GitHub Integration API versions prior to 2025-11-15. The vulnerability allows remote attackers who have some level of authenticated access (PR:L) to bypass authorization controls by manipulating the repository owner and name fields during API configuration. The API fails to verify that these fields belong to the GitHub App Installation ID associated with the user's organization, enabling attackers to request metadata for repositories outside their authorized scope. This metadata may include sensitive information about repositories that the attacker should not access, leading to a confidentiality breach. The vulnerability does not impact integrity or availability, and no user interaction is required for exploitation. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, scope changed, and low confidentiality impact. No known exploits have been reported, and no patches have been released yet. The vulnerability highlights a common security design flaw where authorization checks are insufficient or improperly implemented in API endpoints dealing with third-party integrations.
Potential Impact
For European organizations, the primary impact of CVE-2025-67844 is unauthorized disclosure of sensitive repository metadata, which could include project details, configuration data, or other intellectual property. This exposure could facilitate further attacks such as social engineering, reconnaissance for supply chain attacks, or leakage of proprietary information. Organizations relying on Mintlify Platform integrated with GitHub for documentation or development workflows may inadvertently expose internal or private repository information to unauthorized users within their organization or potentially to external attackers with compromised credentials. While the vulnerability does not allow modification or deletion of data, the confidentiality breach could undermine trust, violate data protection regulations such as GDPR if personal or sensitive data is exposed, and cause reputational damage. The requirement for some privileges to exploit limits the risk to insiders or attackers who have gained limited access, but the network attack vector means exploitation can occur remotely. The absence of patches increases the urgency for mitigation.
Mitigation Recommendations
To mitigate CVE-2025-67844, organizations should implement strict validation of repository owner and name fields against the GitHub App Installation ID within the Mintlify Platform's API configuration. This validation must ensure that only repositories legitimately associated with the user's organization and installation ID can be accessed. Until an official patch is released, organizations should restrict API access to trusted users and monitor API logs for unusual or unauthorized repository access attempts. Employing least privilege principles for GitHub App installations and limiting the scope of repository access can reduce exposure. Additionally, organizations should conduct internal audits of repository metadata access and review integration configurations for potential misconfigurations. If possible, temporarily disable or limit the use of the Mintlify GitHub Integration API in sensitive environments. Finally, maintain awareness of vendor updates and apply patches promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2025-67844: CWE-425 Direct Request ('Forced Browsing') in Mintlify Mintlify Platform
Description
The GitHub Integration API in Mintlify Platform before 2025-11-15 allows remote attackers to obtain sensitive repository metadata via the repository owner and name fields. It fails to validate that the repository owner and name fields provided during configuration belong to the specific GitHub App Installation ID associated with the user's organization.
AI-Powered Analysis
Technical Analysis
CVE-2025-67844 is a vulnerability classified under CWE-425 (Direct Request or Forced Browsing) affecting the Mintlify Platform's GitHub Integration API versions prior to 2025-11-15. The vulnerability allows remote attackers who have some level of authenticated access (PR:L) to bypass authorization controls by manipulating the repository owner and name fields during API configuration. The API fails to verify that these fields belong to the GitHub App Installation ID associated with the user's organization, enabling attackers to request metadata for repositories outside their authorized scope. This metadata may include sensitive information about repositories that the attacker should not access, leading to a confidentiality breach. The vulnerability does not impact integrity or availability, and no user interaction is required for exploitation. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, scope changed, and low confidentiality impact. No known exploits have been reported, and no patches have been released yet. The vulnerability highlights a common security design flaw where authorization checks are insufficient or improperly implemented in API endpoints dealing with third-party integrations.
Potential Impact
For European organizations, the primary impact of CVE-2025-67844 is unauthorized disclosure of sensitive repository metadata, which could include project details, configuration data, or other intellectual property. This exposure could facilitate further attacks such as social engineering, reconnaissance for supply chain attacks, or leakage of proprietary information. Organizations relying on Mintlify Platform integrated with GitHub for documentation or development workflows may inadvertently expose internal or private repository information to unauthorized users within their organization or potentially to external attackers with compromised credentials. While the vulnerability does not allow modification or deletion of data, the confidentiality breach could undermine trust, violate data protection regulations such as GDPR if personal or sensitive data is exposed, and cause reputational damage. The requirement for some privileges to exploit limits the risk to insiders or attackers who have gained limited access, but the network attack vector means exploitation can occur remotely. The absence of patches increases the urgency for mitigation.
Mitigation Recommendations
To mitigate CVE-2025-67844, organizations should implement strict validation of repository owner and name fields against the GitHub App Installation ID within the Mintlify Platform's API configuration. This validation must ensure that only repositories legitimately associated with the user's organization and installation ID can be accessed. Until an official patch is released, organizations should restrict API access to trusted users and monitor API logs for unusual or unauthorized repository access attempts. Employing least privilege principles for GitHub App installations and limiting the scope of repository access can reduce exposure. Additionally, organizations should conduct internal audits of repository metadata access and review integration configurations for potential misconfigurations. If possible, temporarily disable or limit the use of the Mintlify GitHub Integration API in sensitive environments. Finally, maintain awareness of vendor updates and apply patches promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-12T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6944b7d24eb3efac36c40a51
Added to database: 12/19/2025, 2:26:26 AM
Last enriched: 12/26/2025, 4:29:05 AM
Last updated: 2/7/2026, 6:25:51 AM
Views: 176
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
UnknownCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.