We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52477

Octo-STS Vulnerable to Unauthenticated SSRF with HTTP Response Reflection in OIDC Flow



Description

Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging.

Reserved 2025-06-17 | Published 2025-06-26 | Updated 2025-06-26 | Assigner GitHub_M


HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 0.5.3
affected

References

github.com/...ts/app/security/advisories/GHSA-h3qp-hwvr-9xcq

github.com/...ts/app/security/advisories/GHSA-h3qp-hwvr-9xcq

github.com/...ommit/0f177fde54f9318e33f0bba6abaea9463a7c3afd

github.com/...ommit/b3976e39bd8c8c217c0670747d34a4499043da92

cve.org (CVE-2025-52477)

nvd.nist.gov (CVE-2025-52477)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52477

Support options

Helpdesk Chat, Email, Knowledgebase