Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Code Execution Vulnerability Patched in GitHub Enterprise Server

Posted on June 25, 2025June 25, 2025 By CWS

Code-hosting platform GitHub has rolled out patches for a distant code execution (RCE) vulnerability in a number of Enterprise Server variations.

Tracked as CVE-2025-3509 (CVSS rating of seven.1), the flaw may have allowed attackers to use the pre-receive hook performance to bind to ports which might be dynamically allotted and change into out there.

Exploitation of the flaw, GitHub says, is simply potential beneath particular operational situations, which means that the assault window is lowered.

“This vulnerability is simply exploitable beneath particular operational situations, comparable to through the scorching patching course of, and requires both website administrator permissions or a consumer with privileges to switch repositories containing pre-receive hooks,” GitHub explains.

An preliminary repair for the safety defect was discovered incomplete, permitting attackers to use the difficulty in sure circumstances, and a brand new patch was rolled out, the Microsoft-owned platform says.

Profitable exploitation of CVE-2025-3509 may have allowed attackers to execute arbitrary code and elevate their privileges, probably resulting in full system compromise.

In keeping with GitHub, all Enterprise Server releases prior to three.18 are affected. Fixes for the bug had been included in Enterprise Server variations 3.17.1, 3.16.4, 3.15.8, 3.14.13, and three.13.16, which had been rolled out final week.

GitHub says the vulnerability was reported by way of its bug bounty program and makes no point out of its in-the-wild exploitation.Commercial. Scroll to proceed studying.

Associated: Information Deleted From GitHub Repos Leak Invaluable Secrets and techniques

Associated: GitHub Patches Crucial Vulnerability in Enterprise Server

Associated: GitHub Actions Artifacts Leak Tokens and Expose Cloud Companies and Repositories

Security Week News Tags:Code, Enterprise, Execution, GitHub, Patched, Server, Vulnerability

Post navigation

Previous Post: Beware the Hidden Risk in Your Entra Environment
Next Post: Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

Related Posts

Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
Chrome to Distrust Chunghwa Telecom and Netlock Certificates Security Week News
Asus Armoury Crate Vulnerability Leads to Full System Compromise Security Week News
Choosing a Clear Direction in the Face of Growing Cybersecurity Demands Security Week News
Chrome, Firefox Updates Resolve High-Severity Memory Bugs Security Week News
Motors Theme Vulnerability Exploited to Hack WordPress Websites Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Thousands of SaaS Apps Could Still Be Susceptible to nOAuth
  • Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
  • Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears
  • Hackers Abuse ConnectWise to Hide Malware
  • SonicWall Warns of Trojanized NetExtender Stealing User Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Thousands of SaaS Apps Could Still Be Susceptible to nOAuth
  • Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
  • Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears
  • Hackers Abuse ConnectWise to Hide Malware
  • SonicWall Warns of Trojanized NetExtender Stealing User Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News