CVE-2025-67844

5.0 MEDIUM

📋 TL;DR

This vulnerability in Mintlify Platform's GitHub Integration API allows attackers to access sensitive repository metadata by exploiting improper validation of repository ownership. Attackers can specify arbitrary repository owner/name fields to retrieve metadata that should be restricted to their organization's GitHub App Installation ID. Organizations using Mintlify Platform with GitHub integration are affected.

💻 Affected Systems

Products:
  • Mintlify Platform
Versions: All versions before 2025-11-15
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with GitHub Integration API enabled and configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate and access metadata from private repositories across GitHub organizations, potentially revealing sensitive project information, contributor details, and repository structures.

🟠

Likely Case

Unauthorized access to repository metadata including repository names, descriptions, visibility status, and basic configuration details that could aid in reconnaissance for further attacks.

🟢

If Mitigated

With proper access controls and validation, only authorized users can access metadata for repositories belonging to their organization's GitHub App installation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the GitHub Integration API endpoint and knowledge of repository names/owners to target.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions from 2025-11-15 onward

Vendor Advisory: https://www.mintlify.com/docs/changelog

Restart Required: No

Instructions:

1. Update Mintlify Platform to version dated 2025-11-15 or later. 2. Verify GitHub Integration API endpoints now properly validate repository ownership against GitHub App Installation ID.

🔧 Temporary Workarounds

Disable GitHub Integration API

all

Temporarily disable the vulnerable GitHub Integration API endpoint until patching is complete.

# Configuration dependent - consult Mintlify documentation for API endpoint management

Implement API Gateway Validation

all

Add additional validation layer at API gateway to verify repository ownership matches organization's GitHub App Installation ID.

# Implementation specific to your API gateway solution

🧯 If You Can't Patch

  • Implement strict network access controls to limit GitHub Integration API access to trusted IP ranges only.
  • Enable detailed logging and monitoring for all GitHub Integration API requests to detect unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check Mintlify Platform version date. If before 2025-11-15 and GitHub Integration API is enabled, the system is vulnerable.

Check Version:

Check Mintlify Platform admin dashboard or API for version/date information.

Verify Fix Applied:

After updating, test GitHub Integration API with repository owner/name fields that don't belong to your organization's GitHub App Installation ID. Requests should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • Failed repository ownership validation attempts
  • GitHub Integration API requests for repositories outside organization scope
  • Unusual patterns of metadata retrieval requests

Network Indicators:

  • HTTP requests to GitHub Integration API endpoints with repository parameters
  • API responses containing repository metadata for unauthorized repositories

SIEM Query:

source="mintlify" AND (api_endpoint="github-integration" OR endpoint="*github*") AND (response_code=200 OR status="success") | stats count by repository_owner, repository_name

🔗 References

📤 Share & Export