{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14046","assignerOrgId":"82327ea3-741d-41e4-88f8-2cf9e791e760","state":"PUBLISHED","assignerShortName":"GitHub_P","dateReserved":"2025-12-04T16:22:53.626Z","datePublished":"2025-12-11T17:52:05.353Z","dateUpdated":"2025-12-11T18:48:17.846Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Enterprise Server","vendor":"GitHub","versions":[{"status":"unaffected","version":"3.19.0","versionType":"semver"},{"changes":[{"at":"3.18.3","status":"unaffected"}],"lessThanOrEqual":"3.18.2","status":"affected","version":"3.18.0","versionType":"semver"},{"changes":[{"at":"3.17.9","status":"unaffected"}],"lessThanOrEqual":"3.17.8","status":"affected","version":"3.17.0","versionType":"semver"},{"changes":[{"at":"3.16.12","status":"unaffected"}],"lessThanOrEqual":"3.16.11","status":"affected","version":"3.16.0","versionType":"semver"},{"changes":[{"at":"3.15.16","status":"unaffected"}],"lessThanOrEqual":"3.15.15","status":"affected","version":"3.15.0","versionType":"semver"},{"changes":[{"at":"3.14.21","status":"unaffected"}],"lessThanOrEqual":"3.14.20","status":"affected","version":"3.14.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"André Storfjord Kristiansen"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed user-supplied HTML to inject DOM elements with IDs that collided with server-initialized data islands. These collisions could overwrite or shadow critical application state objects used by certain Project views, leading to unintended server-side POST requests or other unauthorized backend interactions. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a privileged user to view crafted malicious content that includes conflicting HTML elements. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18.3, 3.17.9, 3.16.12, 3.15.16, and 3.14.21."}],"value":"An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed user-supplied HTML to inject DOM elements with IDs that collided with server-initialized data islands. These collisions could overwrite or shadow critical application state objects used by certain Project views, leading to unintended server-side POST requests or other unauthorized backend interactions. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a privileged user to view crafted malicious content that includes conflicting HTML elements. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18.3, 3.17.9, 3.16.12, 3.15.16, and 3.14.21."}],"impacts":[{"capecId":"CAPEC-588","descriptions":[{"lang":"en","value":"CAPEC-588 DOM-Based XSS"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.6,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"82327ea3-741d-41e4-88f8-2cf9e791e760","shortName":"GitHub_P","dateUpdated":"2025-12-11T17:52:05.353Z"},"references":[{"url":"https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.3"},{"url":"https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.9"},{"url":"https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.12"},{"url":"https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.16"},{"url":"https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.21"}],"source":{"discovery":"EXTERNAL"},"title":"Insufficient HTML Sanitization Allows User-Controlled DOM Elements to Overwrite Server-Initialized Data Islands and Trigger Unintended Server-Side POST Requests","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-11T18:46:58.599003Z","id":"CVE-2025-14046","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-11T18:48:17.846Z"}}]}}