Authorization Bypass in GitHub Enterprise Server
CVE-2026-3307

5.3MEDIUM

Key Information:

Vendor

Github

Vendor
CVE Published:
21 April 2026

What is CVE-2026-3307?

An authorization bypass flaw was discovered in GitHub Enterprise Server, enabling an administrator of one repository to alter the secret scanning push protection bypass reviewer list of another repository by manipulating the owner_id parameter in the request. Although the vulnerability is limited to the reassignment of existing trusted users as bypass reviewers, it does not permit the addition of unauthorized external users. All versions prior to 3.21 are affected, and the issue was resolved in specified later versions following a report through the GitHub Bug Bounty program.

Affected Version(s)

Enterprise Server 3.14.0 <= 3.14.24

Enterprise Server 3.14.0 <= 3.14.24

Enterprise Server 3.15.0 <= 3.15.19

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

ahacker1
.