Ad

CVE-2025-13744

HIGH CVSS 4.0: 8.4 EPSS 0.04%
Updated Jan 30, 2026
GitHub
Parameter Value
CVSS 8.4 (HIGH)
Affected Versions 3.14.0 — 3.18.2
Fixed In 3.14.20
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor GitHub
Public PoC No

An Improper Neutralization of Input During Web Page Generation vulnerability was identified in GitHub Enterprise Server that allowed attacker controlled HTML to be rendered by the Filter component (search) across GitHub that could be used to exfiltrate sensitive information. An attacker would require permissions to create or modify the names of milestones, issues, pull requests, or similar entities that are rendered in the vulnerable filter/search components. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.19.1, and 3.18.2, 3.17.8, 3.16.11, 3.15.15, and 3.14.20.

This vulnerability was reported via the GitHub Bug Bounty program.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
Low
Basic privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v4.0

Vulnerable Products 6

Configuration From (including) Up to (excluding)
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.14.0 3.14.20
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.15.0 3.15.15
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.16.0 3.16.11
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.17.0 3.17.8
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
3.18.0 3.18.2
Github Enterprise_Server
cpe:2.3:a:github:enterprise_server:3.19.0:*:*:*:*:*:*:*