Sensitive Information Exposure in GitHub Enterprise Server by GitHub
CVE-2025-6600

6.3MEDIUM

Key Information:

Vendor

Github

Vendor
CVE Published:
1 July 2025

What is CVE-2025-6600?

A vulnerability allowing the disclosure of private repository names was found in GitHub Enterprise Server, specifically affecting version 3.17. This issue arises when a user-to-server token with no scopes is exploited via the Search API endpoint. An attacker could leverage this vulnerability if a malicious GitHub App is installed by an organization administrator within their repositories. The vulnerability poses significant risks to organizational privacy and security, as it exposes sensitive information about repository structures. The issue was rectified in version 3.17.2 following a report through the GitHub Bug Bounty program.

Affected Version(s)

GitHub Enterprise Server 3.17.0 <= 3.17.1

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Kyle Carberry
Ammar Bandukwala
.
CVE-2025-6600 : Sensitive Information Exposure in GitHub Enterprise Server by GitHub