NVD - CVE-2026-3854

6 min read Original article ↗

CVE-2026-3854 Detail

Current Description

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.

View Analysis Description

Analysis Description

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.

Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.

CVSS 4.0 Severity and Vector Strings:


NIST CVSS score

NIST: NVD

N/A

NVD assessment not yet provided.


Nist CVSS score does not match with CNA score

CNA:  GitHub, Inc. (Products Only)

CVSS-B 8.7 HIGH

Vector:  CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVSS 3.x Severity and Vector Strings:


NIST CVSS score

NIST: NVD

Base Score:  8.8 HIGH

Vector:  CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0 Severity and Vector Strings:

National Institute of Standards and Technology

NIST: NVD

Base Score: N/A

NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.25 GitHub, Inc. (Products Only)
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.20 GitHub, Inc. (Products Only)
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.16 GitHub, Inc. (Products Only)
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.13 GitHub, Inc. (Products Only)
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.7 GitHub, Inc. (Products Only)
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.4 GitHub, Inc. (Products Only)
https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854 CISA-ADP

Weakness Enumeration

CWE-ID CWE Name Source
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') GitHub, Inc. (Products Only)  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

4 change records found show changes

CVE Modified by CISA-ADP 4/28/2026 3:37:39 PM

Action Type Old Value New Value
Added Reference
https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854

CVE Modified by GitHub, Inc. (Products Only) 4/17/2026 2:16:31 PM

Action Type Old Value New Value
Changed Description
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.25
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.20
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.16
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.13
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.7
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.4
Removed Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24
Removed Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19
Removed Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15
Removed Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12
Removed Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6
Removed Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3
Removed Reference Type
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24 Types: Release Notes
Removed Reference Type
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19 Types: Release Notes
Removed Reference Type
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15 Types: Release Notes
Removed Reference Type
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12 Types: Release Notes
Removed Reference Type
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6 Types: Release Notes
Removed Reference Type
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3 Types: Release Notes

Initial Analysis by NIST 3/12/2026 2:45:25 PM

Action Type Old Value New Value
Added CVSS V3.1
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CPE Configuration
OR
          *cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.17.0 up to (excluding) 3.17.12
          *cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.18.0 up to (excluding) 3.18.6
          *cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.19.0 up to (excluding) 3.19.3
          *cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions up to (excluding) 3.14.24
          *cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.15.0 up to (excluding) 3.15.19
          *cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* versions from (including) 3.16.0 up to (excluding) 3.16.15
Added Reference Type
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24 Types: Release Notes
Added Reference Type
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19 Types: Release Notes
Added Reference Type
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15 Types: Release Notes
Added Reference Type
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12 Types: Release Notes
Added Reference Type
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6 Types: Release Notes
Added Reference Type
GitHub, Inc. (Products Only): https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3 Types: Release Notes

New CVE Received from GitHub, Inc. (Products Only) 3/10/2026 2:19:06 PM

Action Type Old Value New Value
Added Description
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.
Added CVSS V4.0
AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Added CWE
CWE-77
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6
Added Reference
https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3

Quick Info

CVE Dictionary Entry:
CVE-2026-3854
NVD Published Date:
03/10/2026
NVD Last Modified:
04/28/2026
Source:
GitHub, Inc. (Products Only)