CVE-2025-8447
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-26

Last updated on: 2025-09-03

Assigner: GitHub, Inc. (Products Only)

Description
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed users with access to any repository to retrieve limited code content from another repository by creating a diff between the repositories. To exploit this vulnerability, an attacker needed to know the name of a private repository along with its branches, tags, or commit SHAs that they could use to trigger compare/diff functionality and retrieve limited code without proper authorization. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18, and was fixed in versions 3.14.17, 3.15.12, 3.16.8 and 3.17.5. This vulnerability was reported via the GitHub Bug Bounty program.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-26
Last Modified
2025-09-03
Generated
2026-05-07
AI Q&A
2025-08-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
github enterprise_server to 3.14.17 (exc)
github enterprise_server From 3.15.0 (inc) to 3.15.12 (exc)
github enterprise_server From 3.16.0 (inc) to 3.16.8 (exc)
github enterprise_server From 3.17.0 (inc) to 3.17.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper access control issue in GitHub Enterprise Server that allowed users with access to any repository to retrieve limited code content from another repository without proper authorization. An attacker needed to know the name of a private repository and some of its branches, tags, or commit SHAs to exploit the compare/diff functionality and access code they should not have access to.


How can this vulnerability impact me? :

This vulnerability could allow an attacker with limited access to one repository to access limited code content from private repositories they should not have access to. This could lead to unauthorized disclosure of proprietary or sensitive code, potentially compromising intellectual property or security of the affected projects.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade your GitHub Enterprise Server to one of the fixed versions: 3.14.17, 3.15.12, 3.16.8, or 3.17.5 or later. Avoid using versions prior to 3.18 until patched.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart