HomeGithubCVE-2024-5746

CVE-2024-5746

HIGH
7.6CVSS
Published: 2024-06-20
Updated: 2025-08-27
AI Analysis

Description

A Server-Side Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with the Site Administrator role to gain arbitrary code execution capability on the GitHub Enterprise Server instance. Exploitation required authenticated access to GitHub Enterprise Server as a user with the Site Administrator role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 and was fixed in versions 3.12.5, 3.11.11, 3.10.13, and 3.9.16. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:L
Attack Vector
network
Complexity
low
Privileges
high
User Action
none
Scope
changed
Confidentiality
none
Integrity
high
Availability
low
Weaknesses
CWE-918

Metadata

Primary Vendor
GITHUB
Published
6/20/2024
Last Modified
8/27/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

github : enterprise_servergithub : enterprise_servergithub : enterprise_servergithub : enterprise_server

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-5746 | HIGH Severity | CVEDatabase.com | CVEDatabase.com