An improper neutralization of input vulnerability was...
High severity
Unreviewed
Published
Dec 11, 2025
to the GitHub Advisory Database
•
Updated Dec 19, 2025
Description
Published by the National Vulnerability Database
Dec 11, 2025
Published to the GitHub Advisory Database
Dec 11, 2025
Last updated
Dec 19, 2025
An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed user-supplied HTML to inject DOM elements with IDs that collided with server-initialized data islands. These collisions could overwrite or shadow critical application state objects used by certain Project views, leading to unintended server-side POST requests or other unauthorized backend interactions. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a privileged user to view crafted malicious content that includes conflicting HTML elements. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18.3, 3.17.9, 3.16.12, 3.15.16, and 3.14.21.
References