Cryptographic Signature Spoofing Vulnerability in GitHub Enterprise Server
CVE-2025-23369

7.6HIGH

Key Information:

Vendor

Github

Vendor
CVE Published:
21 January 2025

Badges

๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 3,740๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-23369?

CVE-2025-23369 is a cryptographic signature spoofing vulnerability identified in GitHub Enterprise Server, a platform widely used for version control and collaborative software development. This vulnerability allows unauthorized internal users to bypass verification processes, potentially enabling them to manipulate signature-based operations. Organizations utilizing affected versions of GitHub Enterprise Server could face severe disruptions, including unauthorized changes to code repositories and compromised software integrity, jeopardizing project security and trust.

Technical Details

The vulnerability stems from improper validation of cryptographic signatures within the GitHub Enterprise Server. Specifically, it affects all versions prior to 3.12.14, 3.13.10, 3.14.7, 3.15.2, and 3.16.0. Instances that do not implement SAML single sign-on or where the attacker is not an existing user are not susceptible. The flaw was reported through GitHub's Bug Bounty program, highlighting its serious nature and the need for immediate attention from organizations using the software.

Potential Impact of CVE-2025-23369

  1. Unauthorized Code Changes: Attackers could exploit this vulnerability to perform unauthorized modifications to repositories, risking the integrity of critical code and potentially introducing malicious components into software projects.

  2. Compromised Software Integrity: The ability to spoof cryptographic signatures can result in the deployment of tampered software binaries, undermining the trustworthiness of applications developed using GitHub Enterprise Server.

  3. Operational Disruptions: As malicious users gain access to internal tools and processes, organizations may experience significant operational challenges, including disruption to workflows and loss of confidence among developers and stakeholders.

Affected Version(s)

Enterprise Server 3.12.0 <= 3.12.13

Enterprise Server 3.13.0 <= 3.13.9

Enterprise Server 3.14.0 <= 3.14.6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

7% chance of being exploited in the next 30 days.

CVSS V4

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

hakivvi
.
CVE-2025-23369 : Cryptographic Signature Spoofing Vulnerability in GitHub Enterprise Server