Remote Code Execution Vulnerability in GitHub Enterprise Server
CVE-2026-3854

8.7HIGH

Key Information:

Vendor

Github

Vendor
CVE Published:
10 March 2026

Badges

🥇 Trended No. 1📈 Trended📈 Score: 130,000💰 Ransomware👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2026-3854?

CVE-2026-3854: Overview

CVE-2026-3854 is a serious vulnerability found in GitHub Enterprise Server, a platform widely used for version control and collaborative software development. This specific flaw is categorized as a remote code execution (RCE) vulnerability, which arises from the improper handling of user input during git push operations. An attacker with push access to a repository could exploit this vulnerability to inject malicious code via specially crafted push option values that were not adequately sanitized. This lack of proper input validation allows unauthorized users to manipulate internal headers, potentially compromising the entire server's integrity. The implications of this vulnerability are significant, as organizations utilizing GitHub Enterprise Server could face severe operational disruptions and security breaches if they do not promptly apply the necessary patches provided in the updated server versions.

Potential Impact of CVE-2026-3854

  1. Remote Code Execution: The most critical impact of CVE-2026-3854 is the ability for an attacker to execute arbitrary code on the affected GitHub Enterprise Server instance. This level of access allows attackers to manipulate, alter, or expose sensitive code and data within repositories, leading to significant threats including data loss or data exfiltration.

  2. Compromise of Repository Integrity: With the exploitation of this vulnerability, attackers can introduce unauthorized changes or malicious code into repositories. This not only affects the integrity of the codebase but also has the potential to degrade trust among contributors and users of the software, which can have lasting implications on collaborative software development efforts.

  3. Operational Disruption: Organizations may face substantial disruption to their development processes if this vulnerability is exploited. If an attacker gains control of the server, they may deploy malicious software, halt operations, or cause data breaches that necessitate emergency remediation efforts, ultimately affecting business continuity and potentially leading to legal and financial repercussions.

Affected Version(s)

Enterprise Server 3.14.0 <= 3.14.24

Enterprise Server 3.14.0 <= 3.14.24

Enterprise Server 3.15.0 <= 3.15.19

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Week 18 – 2026

If you're organisation is interested in sponsoring an upcoming post then reach out via the contact form!No sponsor this week Forensic Analysis Andrew Garrett A Digital Forensic View: How iOS 15+ Lets You Change Photo & Video Timestamps (And What It Really Means) Brian Carrier at Cyber Triage DFIR + ...

1 week ago

This Week In Security: State Malware, State Hardware Bans, And Stuxnet Before Stuxnet Was Cool

Making headlines everywhere is the CopyFail Linux kernel vulnerability, which allows local privilege escalation (LPE) from any user to root privileges on most kernels and distributions. Local privi…

2 weeks ago

Wiz hands GitHub AI-aided bug report that isn't total slop

: Claude ploughs through months of work in rapid time, helps Wiz researchers nab lucrative award

2 weeks ago

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 💰

    Used in Ransomware

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by theregister

  • 🥇

    Vulnerability reached the number 1 worldwide trending spot

  • 📈

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sagi Tzadik @ Wiz.io
.