There is a lack of input validation for user-provided values in certain functions.
In the GitHub.repo() function, the user can provide any string for the repo_name field. These inputs are not validated or safely encoded and are sent directly to the server.
This means a user can add path traversal patterns like ../ in the input to access any other endpoints on api.github.com that were not intended.
Users should upgrade immediately to v5.9.1 or later. All prior versions are vulnerable. We recommend users upgrade to v5.10.0
None
Fixed by: https://github.com/JuliaWeb/GitHub.jl/pull/224 (which is available in v5.9.1).
splitline from the DEVCORE Research Team for reported similar issues in other packages. Audit of equivalent problems in this package resulted in this issue, found by Dilum Aluthge.
{
"license": "CC-BY-4.0",
"sources": [
{
"published": "2025-06-24T23:01:49Z",
"url": "https://api.github.com/repos/JuliaWeb/GitHub.jl/security-advisories/GHSA-jg9p-c3wh-q83x",
"modified": "2025-06-24T23:01:49Z",
"html_url": "https://github.com/JuliaWeb/GitHub.jl/security/advisories/GHSA-jg9p-c3wh-q83x",
"id": "GHSA-jg9p-c3wh-q83x",
"imported": "2025-10-07T14:32:35.253Z"
}
]
}