CVE-2025-48938
Prevent GitHub CLI and extensions from executing arbitrary commands from compromised GitHub Enterprise Server
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
go-gh is a collection of Go modules to make authoring GitHub CLI extensions easier. A security vulnerability has been identified in versions prior to 2.12.1 where an attacker-controlled GitHub Enterprise Server could result in executing arbitrary commands on a user's machine by replacing HTTP URLs provided by GitHub with local file paths for browsing. In `2.12.1`, `Browser.Browse()` has been enhanced to allow and disallow a variety of scenarios to avoid opening or executing files on the filesystem without unduly impacting HTTP URLs. No known workarounds are available other than upgrading.
These are all security issues fixed in the govulncheck-vulndb-0.0.20250612T141001-1.1 package on the GA media of openSUSE Tumbleweed.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2025-05-28 CVE Reserved
- 2025-05-30 CVE Published
- 2025-05-30 CVE Updated
- 2025-07-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-501: Trust Boundary Violation
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/cli/go-gh/blob/61bf393cf4aeea6d00a6251390f5f67f5b67e727/pkg/browser/browser.go | X_refsource_misc | |
https://github.com/cli/go-gh/commit/a08820a13f257d6c5b4cb86d37db559ec6d14577 | X_refsource_misc | |
https://github.com/cli/go-gh/security/advisories/GHSA-g9f5-x53j-h563 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|