Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67844: CWE-425 Direct Request ('Forced Browsing') in Mintlify Mintlify Platform

0
Medium
VulnerabilityCVE-2025-67844cvecve-2025-67844cwe-425
Published: Fri Dec 19 2025 (12/19/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Mintlify
Product: Mintlify Platform

Description

The GitHub Integration API in Mintlify Platform before 2025-11-15 allows remote attackers to obtain sensitive repository metadata via the repository owner and name fields. It fails to validate that the repository owner and name fields provided during configuration belong to the specific GitHub App Installation ID associated with the user's organization.

AI-Powered Analysis

AILast updated: 12/19/2025, 02:42:20 UTC

Technical Analysis

CVE-2025-67844 is a vulnerability classified under CWE-425 (Direct Request or Forced Browsing) affecting the Mintlify Platform's GitHub Integration API prior to version 2025-11-15. The issue stems from insufficient validation of the repository owner and name fields during API configuration, where the platform fails to confirm that these fields belong to the GitHub App Installation ID associated with the user's organization. This flaw allows a remote attacker with authenticated access (PR:L) to craft API requests specifying arbitrary repository owner and name values, thereby retrieving sensitive metadata about repositories outside their authorized scope. The vulnerability does not require user interaction (UI:N) and can be exploited over the network (AV:N) with low attack complexity (AC:L). The impact is limited to confidentiality (C:L) as the attacker can obtain repository metadata but cannot alter data or disrupt service (I:N, A:N). The vulnerability has a CVSS 3.1 base score of 5.0, indicating medium severity. No patches or known exploits are currently documented, but the flaw presents a risk of information disclosure that could facilitate further attacks or reconnaissance. The core technical issue is the lack of ownership verification linking repository identifiers to the GitHub App Installation ID, which is a critical security control in multi-tenant or organization-scoped integrations.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive repository metadata, including potentially confidential project details, configuration data, or internal development information. Such exposure can aid attackers in mapping organizational assets, identifying vulnerable codebases, or planning targeted attacks such as social engineering or supply chain compromises. While the vulnerability does not allow modification or denial of service, the confidentiality breach can undermine trust and compliance, especially under GDPR regulations concerning data protection and privacy. Organizations heavily reliant on Mintlify Platform integrated with GitHub for documentation or development workflows are at higher risk. The impact is particularly significant for sectors with stringent data confidentiality requirements, such as finance, healthcare, and critical infrastructure. Although exploitation requires authenticated access, insider threats or compromised credentials could be leveraged to exploit this flaw. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

To mitigate CVE-2025-67844, organizations should ensure that Mintlify Platform is updated to versions released after 2025-11-15 that include proper validation of repository owner and name fields against the GitHub App Installation ID. Until patches are available, restrict access to the GitHub Integration API to trusted users and service accounts with minimal privileges. Implement monitoring and alerting for unusual API requests that specify repository identifiers outside the expected scope. Enforce strong authentication and credential management policies to reduce the risk of compromised accounts. Conduct regular audits of API usage logs to detect potential forced browsing attempts. Additionally, organizations should consider isolating sensitive repositories or metadata from integration tools where possible and apply the principle of least privilege in GitHub App installations. Collaboration with Mintlify support for timely updates and security advisories is recommended. Finally, incorporate this vulnerability into incident response plans to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944b7d24eb3efac36c40a51

Added to database: 12/19/2025, 2:26:26 AM

Last enriched: 12/19/2025, 2:42:20 AM

Last updated: 12/19/2025, 6:26:37 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats