CVSS 3.1 Score 3.7 of 10 (low)


Published Jan 16, 2024


CVE-2023-51381 is a vulnerability classified as "Cross-site Scripting" in the tag name pattern field of the tag protections UI in GitHub Enterprise Server versions 3.8.12 to 3.11.2, allowing a malicious website to make changes to a user account through Content Security Policy (CSP) bypass with created CSRF tokens. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and 3.8.13. The vulnerability required user interaction and social engineering for exploitation and was reported via the GitHub Bug Bounty program. It has a base severity level of LOW, with low impact on integrity and confidentiality, and no availability impact.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-51381 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options