Private Repo Name Leak in GitHub EE 3.17 via Malicious App
CVE-2025-6600 Published on July 1, 2025

GitHub Enterprise Server Information Disclosure Vulnerability Exposes Private Repository Names via Search API
An exposure of sensitive information vulnerability was identified in GitHub Enterprise Server that could allow an attacker to disclose the names of private repositories within an organization. This issue could be exploited by leveraging a user-to-server token with no scopes via the Search API endpoint. Successful exploitation required an organization administrator to install a malicious GitHub App in the organizations repositories. This vulnerability impacted only GitHub Enterprise Server version 3.17 and was addressed in version 3.17.2. The vulnerability was reported through the GitHub Bug Bounty program.

NVD

Weakness Type

What is an Information Disclosure Vulnerability?

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CVE-2025-6600 has been classified to as an Information Disclosure vulnerability or weakness.


Products Associated with CVE-2025-6600

Want to know whenever a new CVE is published for github Enterprise Server? stack.watch will email you.

 

Affected Versions

GitHub Enterprise Server:

Exploit Probability

EPSS
0.04%
Percentile
12.66%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.