Cryptographic Signature Spoofing Vulnerability in GitHub Enterprise Server
CVE-2025-23369
Key Information:
- Vendor
Github
- Status
- Vendor
- CVE Published:
- 21 January 2025
Badges
What is CVE-2025-23369?
CVE-2025-23369 is a cryptographic signature spoofing vulnerability identified in GitHub Enterprise Server, a platform widely used for version control and collaborative software development. This vulnerability allows unauthorized internal users to bypass verification processes, potentially enabling them to manipulate signature-based operations. Organizations utilizing affected versions of GitHub Enterprise Server could face severe disruptions, including unauthorized changes to code repositories and compromised software integrity, jeopardizing project security and trust.
Technical Details
The vulnerability stems from improper validation of cryptographic signatures within the GitHub Enterprise Server. Specifically, it affects all versions prior to 3.12.14, 3.13.10, 3.14.7, 3.15.2, and 3.16.0. Instances that do not implement SAML single sign-on or where the attacker is not an existing user are not susceptible. The flaw was reported through GitHub's Bug Bounty program, highlighting its serious nature and the need for immediate attention from organizations using the software.
Potential Impact of CVE-2025-23369
-
Unauthorized Code Changes: Attackers could exploit this vulnerability to perform unauthorized modifications to repositories, risking the integrity of critical code and potentially introducing malicious components into software projects.
-
Compromised Software Integrity: The ability to spoof cryptographic signatures can result in the deployment of tampered software binaries, undermining the trustworthiness of applications developed using GitHub Enterprise Server.
-
Operational Disruptions: As malicious users gain access to internal tools and processes, organizations may experience significant operational challenges, including disruption to workflows and loss of confidence among developers and stakeholders.
Affected Version(s)
Enterprise Server 3.12.0 <= 3.12.13
Enterprise Server 3.13.0 <= 3.13.9
Enterprise Server 3.14.0 <= 3.14.6
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
7% chance of being exploited in the next 30 days.
CVSS V4
Timeline
- ๐
Vulnerability started trending
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved