PT-2026-24344 · Github · Github Enterprise Server
Published
2026-03-10
·
Updated
2026-04-28
·
CVE-2026-3854
CVSS v3.1
8.8
High
| AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3
Description
An improper neutralization of special elements issue was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a
git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. The internal header format used a delimiter character that could also appear in user input, allowing an attacker to inject additional metadata fields through crafted push option values. This issue was reported through the GitHub Bug Bounty program.Recommendations
Update to GitHub Enterprise Server version 3.14.24.
Update to GitHub Enterprise Server version 3.15.19.
Update to GitHub Enterprise Server version 3.16.15.
Update to GitHub Enterprise Server version 3.17.12.
Update to GitHub Enterprise Server version 3.18.6.
Update to GitHub Enterprise Server version 3.19.3.
Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Github Enterprise Server