An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed cross-site scripting in GitHub Markdown that used `$$..$$` math blocks. Exploitation required access to the target GitHub Enterprise Server instance and privileged user interaction with the malicious elements. This vulnerability affected version 3.16.1 of GitHub Enterprise Server and was fixed in version 3.16.2. This vulnerability was reported via the GitHub Bug Bounty program.
Metrics
Affected Vendors & Products
References
History
Fri, 05 Sep 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Github
Github enterprise Server |
|
CPEs | cpe:2.3:a:github:enterprise_server:3.16.1:*:*:*:*:*:*:* | |
Vendors & Products |
Github
Github enterprise Server |
|
Metrics |
cvssV3_1
|
Fri, 18 Apr 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 17 Apr 2025 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed cross-site scripting in GitHub Markdown that used `$$..$$` math blocks. Exploitation required access to the target GitHub Enterprise Server instance and privileged user interaction with the malicious elements. This vulnerability affected version 3.16.1 of GitHub Enterprise Server and was fixed in version 3.16.2. This vulnerability was reported via the GitHub Bug Bounty program. | |
Title | Markdown math block sanitization bypass allows privilege escalation and unauthorized workflow triggers | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_P
Published: 2025-04-17T22:50:22.215Z
Updated: 2025-04-18T12:01:53.671Z
Reserved: 2025-04-03T22:33:59.558Z
Link: CVE-2025-3246

Updated: 2025-04-18T11:44:31.412Z

Status : Analyzed
Published: 2025-04-17T23:15:42.123
Modified: 2025-09-05T15:00:02.387
Link: CVE-2025-3246

No data.