CVE-2026-3854 Detail
Current Description
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.
Analysis Description
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.
Metrics
NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:
CNA: GitHub, Inc. (Products Only)
CVSS-B 8.7 HIGH
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS 3.x Severity and Vector Strings:
CVSS 2.0 Severity and Vector Strings:
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].
| URL | Source(s) | Tag(s) |
|---|---|---|
| https://docs.github.com/en/[email protected]/admin/release-notes#3.14.25 | GitHub, Inc. (Products Only) | |
| https://docs.github.com/en/[email protected]/admin/release-notes#3.15.20 | GitHub, Inc. (Products Only) | |
| https://docs.github.com/en/[email protected]/admin/release-notes#3.16.16 | GitHub, Inc. (Products Only) | |
| https://docs.github.com/en/[email protected]/admin/release-notes#3.17.13 | GitHub, Inc. (Products Only) | |
| https://docs.github.com/en/[email protected]/admin/release-notes#3.18.7 | GitHub, Inc. (Products Only) | |
| https://docs.github.com/en/[email protected]/admin/release-notes#3.19.4 | GitHub, Inc. (Products Only) | |
| https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854 | CISA-ADP |
Weakness Enumeration
| CWE-ID | CWE Name | Source |
|---|---|---|
| CWE-77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') | GitHub, Inc. (Products Only) |
Known Affected Software Configurations Switch to CPE 2.2
CPEs loading, please wait.
Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.
Change History
4 change records found show changes
CVE Modified by CISA-ADP 4/28/2026 3:37:39 PM
| Action | Type | Old Value | New Value |
|---|---|---|---|
| Added | Reference |
https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854 |
CVE Modified by GitHub, Inc. (Products Only) 4/17/2026 2:16:31 PM
| Action | Type | Old Value | New Value |
|---|---|---|---|
| Changed | Description |
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3. |
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4. |
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.25 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.20 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.16 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.13 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.7 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.4 |
|
| Removed | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24 |
|
| Removed | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19 |
|
| Removed | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15 |
|
| Removed | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12 |
|
| Removed | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6 |
|
| Removed | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3 |
|
| Removed | Reference Type |
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24 Types: Release Notes |
|
| Removed | Reference Type |
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19 Types: Release Notes |
|
| Removed | Reference Type |
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15 Types: Release Notes |
|
| Removed | Reference Type |
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12 Types: Release Notes |
|
| Removed | Reference Type |
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6 Types: Release Notes |
|
| Removed | Reference Type |
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3 Types: Release Notes |
Initial Analysis by NIST 3/12/2026 2:45:25 PM
| Action | Type | Old Value | New Value |
|---|---|---|---|
| Added | CVSS V3.1 |
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| Added | CPE Configuration |
OR
*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.17.0 up to (excluding) 3.17.12
*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.18.0 up to (excluding) 3.18.6
*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.19.0 up to (excluding) 3.19.3
*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions up to (excluding) 3.14.24
*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.15.0 up to (excluding) 3.15.19
*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.16.0 up to (excluding) 3.16.15
|
|
| Added | Reference Type |
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24 Types: Release Notes |
|
| Added | Reference Type |
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19 Types: Release Notes |
|
| Added | Reference Type |
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15 Types: Release Notes |
|
| Added | Reference Type |
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12 Types: Release Notes |
|
| Added | Reference Type |
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6 Types: Release Notes |
|
| Added | Reference Type |
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3 Types: Release Notes |
New CVE Received from GitHub, Inc. (Products Only) 3/10/2026 2:19:06 PM
| Action | Type | Old Value | New Value |
|---|---|---|---|
| Added | Description |
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3. |
|
| Added | CVSS V4.0 |
AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| Added | CWE |
CWE-77 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6 |
|
| Added | Reference |
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3 |
Quick Info
CVE Dictionary Entry:
CVE-2026-3854
NVD
Published Date:
03/10/2026
NVD
Last Modified:
04/28/2026
Source:
GitHub, Inc. (Products Only)