Ad

CVE-2025-11892

CRITICAL CVSS 3.1: 9.6 EPSS 0.05%
Updated Dec 08, 2025
GitHub
Parameter Value
CVSS 9.6 (CRITICAL)
Affected Versions 3.15.0 — 3.17.7
Fixed In 3.14.19
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor GitHub
Public PoC No

An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allows DOM-based cross-site scripting via Issues search label filter that could lead to privilege escalation and unauthorized workflow triggers. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a user, while operating in sudo mode, to click on a crafted malicious link to perform actions that require elevated privileges. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18.1, 3.17.7, 3.16.10, 3.15.14, 3.14.19.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 5

Configuration From (including) Up to (excluding)
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.14.19
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.15.0 3.15.14
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.16.0 3.16.10
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.17.0 3.17.7
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:3.18.0:*:*:*:*:*:*:*