
GitHub has released security updates to address several vulnerabilities in GitHub Enterprise Server, including a high-severity flaw that could allow attackers to execute arbitrary code. Organizations using GitHub Enterprise Server are urged to apply these patches promptly to protect their systems.
High-Risk Code Execution Vulnerability
A vulnerability (CVE-2025-3509) exists in the pre-receive hook functionality of GitHub Enterprise Server. This flaw could allow a malicious attacker to execute arbitrary code, potentially leading to privilege escalation and complete system compromise. The vulnerability can be exploited by binding to dynamically allocated ports that become temporarily available, such as during a hot patch upgrade.
It’s important to note that this vulnerability is only exploitable under specific operational conditions, such as during the hot patching process. Additionally, exploitation requires either site administrator permissions or a user with privileges to modify repositories containing pre-receive hooks.
Information Disclosure Vulnerability
A medium-severity vulnerability (CVE-2025-3124) could allow an attacker to view private repository names that the signed-in user is not authorized to see. This issue occurs in the GitHub Advanced Security Overview due to a missing authorization check when filtering with “only archived:”.
Cross-Site Scripting Vulnerability
Another high-severity vulnerability (CVE-2025-3246) involves an improper neutralization of input in GitHub’s Markdown rendering. An attacker could exploit this to embed malicious HTML/CSS in math blocks ($$ .. $$), leading to cross-site scripting (XSS). Successful exploitation requires access to the target GitHub Enterprise Server instance and privileged user interaction with the malicious elements. GitHub has mitigated this issue by disallowing math blocks to be escaped early by dollar signs and improving math-rendered content to ensure non-wrapped content is properly escaped.
Affected Versions and Mitigations
The following versions of GitHub Enterprise Server are affected:
- Affected from 3.13.0 through 3.13.13; unaffected from 3.13.14
- Affected from 3.14.0 through 3.14.10; unaffected from 3.14.11
- Affected from 3.15.0 through 3.15.5; unaffected from 3.15.6
- Affected from 3.16.0 through 3.16.1; unaffected from 3.16.2
GitHub has released patched versions to address these vulnerabilities. It is critical for administrators to upgrade their GitHub Enterprise Server instances to the latest unaffected version to ensure the security of their systems and data.