Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-23040 PoC — Maliciously crafted remote URLs could lead to credential leak in GitHub Desktop

Source
Associated Vulnerability
Title:Maliciously crafted remote URLs could lead to credential leak in GitHub Desktop (CVE-2025-23040)
Description:GitHub Desktop is an open-source Electron-based GitHub app designed for git development. An attacker convincing a user to clone a repository directly or through a submodule can allow the attacker access to the user's credentials through the use of maliciously crafted remote URL. GitHub Desktop relies on Git to perform all network related operations (such as cloning, fetching, and pushing). When a user attempts to clone a repository GitHub Desktop will invoke `git clone` and when Git encounters a remote which requires authentication it will request the credentials for that remote host from GitHub Desktop using the git-credential protocol. Using a maliciously crafted URL it's possible to cause the credential request coming from Git to be misinterpreted by Github Desktop such that it will send credentials for a different host than the host that Git is currently communicating with thereby allowing for secret exfiltration. GitHub username and OAuth token, or credentials for other Git remote hosts stored in GitHub Desktop could be improperly transmitted to an unrelated host. Users should update to GitHub Desktop 3.4.12 or greater which fixes this vulnerability. Users who suspect they may be affected should revoke any relevant credentials.
Readme
# CVE-2025-23040 - Credential Leak in GitHub Desktop GitHub Desktop (< 3.4.12) è vulnerabile a un attacco che permette di esfiltrare credenziali tramite URL remoti malevoli. Un attaccante può convincere un utente a clonare un repository manipolato per ottenere username e token OAuth.
File Snapshot

[4.0K] /data/pocs/f8cc7627f4d2afa545622dd8c8b5e5709e2ab419 ├── [4.9K] CVE-2025-23040.json └── [ 287] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →