CVE-2025-11892 Overview
An improper neutralization of input vulnerability (CWE-79) was identified in GitHub Enterprise Server that allows DOM-based cross-site scripting (XSS) via the Issues search label filter. This vulnerability could lead to privilege escalation and unauthorized workflow triggers when exploited successfully.
Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a user, while operating in sudo mode, to click on a crafted malicious link to perform actions that require elevated privileges.
Critical Impact
DOM-based XSS vulnerability enabling privilege escalation and unauthorized workflow triggers in GitHub Enterprise Server environments when administrators operate in elevated sudo mode.
Affected Products
- GitHub Enterprise Server versions prior to 3.14.19
- GitHub Enterprise Server versions prior to 3.15.14, 3.16.10, 3.17.7
- GitHub Enterprise Server version 3.18.0 (prior to 3.18.1)
Discovery Timeline
- 2025-11-10 - CVE-2025-11892 published to NVD
- 2025-12-08 - Last updated in NVD database
Technical Details for CVE-2025-11892
Vulnerability Analysis
This vulnerability stems from improper input neutralization in the Issues search label filter functionality within GitHub Enterprise Server. The DOM-based XSS flaw occurs when user-controlled input is processed by client-side JavaScript without adequate sanitization before being rendered in the browser's Document Object Model.
The attack specifically targets users operating in sudo mode—an elevated privilege state within GitHub Enterprise Server that allows administrators to perform sensitive operations. By crafting a malicious link containing specially constructed payloads in the label filter parameter, an attacker can execute arbitrary JavaScript in the context of the victim's authenticated session.
The impact is particularly severe because actions performed while in sudo mode carry elevated privileges. This allows the attacker to potentially trigger unauthorized GitHub Actions workflows, modify repository configurations, access sensitive organizational data, or perform other privileged operations that would normally require administrative authentication.
Root Cause
The root cause is improper neutralization of special elements used in the Issues search label filter. The client-side JavaScript code fails to properly sanitize or encode user-supplied input before dynamically inserting it into the DOM. This allows malicious script payloads embedded in crafted URLs to be executed when the page renders the unsanitized label filter content.
The vulnerability classification as CWE-79 (Improper Neutralization of Input During Web Page Generation) indicates a failure in the input validation and output encoding mechanisms that should prevent untrusted data from being interpreted as executable code.
Attack Vector
The attack vector is network-based and requires user interaction. An attacker must craft a malicious URL containing the XSS payload within the Issues search label filter parameter and convince an authenticated user—ideally one operating in sudo mode—to click the link.
The exploitation chain involves:
- Attacker crafts a URL with malicious JavaScript in the label filter parameter
- Attacker distributes the link via social engineering (email, chat, etc.)
- Victim clicks the link while authenticated to GitHub Enterprise Server
- The malicious payload executes in the victim's browser context
- If the victim is in sudo mode, the attacker gains access to elevated privileges
The vulnerability can be exploited to perform actions such as triggering unauthorized workflow executions, modifying repository settings, or exfiltrating sensitive data accessible to the compromised user session.
Detection Methods for CVE-2025-11892
Indicators of Compromise
- Unusual URL patterns in web server logs containing encoded JavaScript payloads in Issues search filter parameters
- Unexpected GitHub Actions workflow triggers not initiated by legitimate user activity
- Audit log entries showing privileged operations performed shortly after users accessed unusual URLs
- Client-side error logs indicating script execution from non-standard sources
Detection Strategies
- Monitor web application firewall (WAF) logs for requests containing XSS patterns in query parameters targeting Issues endpoints
- Review GitHub Enterprise Server audit logs for privileged actions correlated with unusual referrer URLs
- Implement browser-based security headers such as Content Security Policy (CSP) to detect and block inline script execution
- Deploy endpoint detection solutions to identify suspicious browser behavior following link clicks
Monitoring Recommendations
- Enable verbose logging for authentication and sudo mode activation events
- Configure alerts for workflow triggers from unexpected sources or containing suspicious patterns
- Implement URL filtering at the network perimeter to block known malicious domains used in social engineering campaigns
- Regularly review audit trails for administrative actions performed during or immediately after link navigation events
How to Mitigate CVE-2025-11892
Immediate Actions Required
- Upgrade GitHub Enterprise Server to a patched version immediately (3.18.1, 3.17.7, 3.16.10, 3.15.14, or 3.14.19 depending on your version branch)
- Alert administrators and users about the risk of clicking untrusted links while in sudo mode
- Review audit logs for any suspicious privileged operations that may indicate prior exploitation
- Implement additional security controls such as Content Security Policy headers where possible
Patch Information
GitHub has released security patches addressing this vulnerability across all supported version branches. Organizations should update to the following minimum versions based on their current deployment:
- Version 3.14.x: Update to 3.14.19 or later - See GitHub Release Notes 3.14.19
- Version 3.15.x: Update to 3.15.14 or later - See GitHub Release Notes 3.15.14
- Version 3.16.x: Update to 3.16.10 or later - See GitHub Release Notes 3.16.10
- Version 3.17.x: Update to 3.17.7 or later - See GitHub Release Notes 3.17.7
- Version 3.18.x: Update to 3.18.1 or later - See GitHub Release Notes 3.18.1
Workarounds
- Instruct administrators to avoid clicking external links while operating in sudo mode
- Implement network-level URL filtering to block requests with suspicious patterns in Issues search parameters
- Configure browser security policies to restrict inline script execution where feasible
- Limit sudo mode session duration to reduce the window of exploitation opportunity
# Verify current GitHub Enterprise Server version
ghe-version
# Check for available updates
ghe-update-check
# Apply security update (backup recommended before updating)
ghe-upgrade /path/to/github-enterprise-3.x.x.pkg
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


