fix(deps): update module github.com/cli/go-gh/v2 to v2.12.1 [security] #8
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.12.0->v2.12.1GitHub Vulnerability Alerts
CVE-2025-48938
Summary
A security vulnerability has been identified in
go-ghwhere an attacker-controlled GitHub Enterprise Server could result in executing arbitrary commands on a user's machine by replacing HTTP URLs provided by GitHub with local file paths for browsing.Details
The GitHub CLI and CLI extensions allow users to transition from their terminal for a variety of use cases through the
Browsercapability ingithub.com/cli/go-gh/v2/pkg/browser:-w, --webflag, GitHub CLI users can view GitHub repositories, issues, pull requests, and more using their web browsergh codespacecommand set, GitHub CLI users can transition to Visual Studio Code to work with GitHub CodespacesThis is done by using URLs provided through API responses from authenticated GitHub hosts when users execute
ghcommands.Prior to
2.12.1,Browser.Browse()would attempt to open the provided URL using a variety of OS-specific approaches regardless of the scheme. An attacker-controlled GitHub Enterprise Server could modify API responses to use a specially tailored local executable path instead of HTTP URLs to resources. This could allow the attacker to execute arbitrary executables on the user's machine.In
2.12.1,Browser.Browse()has been enhanced to allow and disallow a variety of scenarios to avoid opening or executing files on the filesystem without unduly impacting HTTP URLs:http://,https://,vscode://,vscode-insiders://protocols are supportedfile://protocol are unsupportedURLs without protocols will be browsable if none of these other conditions apply.
As we have more information about use cases, maintainers can expand these capabilities for an improved user experience that allows configuring allowed URL schemes and/or prompt the user for an unexpected user case and confirming whether to continue.
Impact
Successful exploitation could cause users of the attacker-controlled GitHub Enterprise Server to execute arbitrary commands.
Remediation and Mitigation
go-ghto2.12.1Release Notes
cli/go-gh (github.com/cli/go-gh/v2)
v2.12.1Compare Source
Security
A security vulnerability has been identified in
go-ghwhere an attacker-controlled GitHub Enterprise Server could result in executing arbitrary commands on a user's machine by replacing HTTP URLs provided by GitHub with local file paths for browsing.For more information, see GHSA-g9f5-x53j-h563
Full Changelog: cli/go-gh@v2.12.0...v2.12.1
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.