Improper Neutralization Vulnerability in GitHub Enterprise Server
CVE-2026-4821

8.1HIGH

Key Information:

Vendor

Github

Vendor
CVE Published:
21 April 2026

What is CVE-2026-4821?

CVE-2026-4821 is a vulnerability identified in GitHub Enterprise Server, a widely used platform for managing Git repositories and collaboration within development teams. This flaw stems from an improper neutralization of special elements, which enables authenticated users with administrator privileges in the Management Console to execute arbitrary operating system commands. This can occur through shell metacharacter injection in proxy configuration fields, such as http_proxy. Organizations leveraging GitHub Enterprise Server may face serious security risks if this vulnerability is exploited, since it permits unauthorized access to execute commands on the system, potentially leading to broader security breaches or integrity compromises.

Potential impact of CVE-2026-4821

  1. Arbitrary Code Execution: The primary risk is the ability for an attacker to execute arbitrary commands on the server. This can lead to complete system takeover, allowing the attacker to manipulate or extract sensitive data, thereby undermining the integrity of the organization's code and potentially leading to data breaches.

  2. Privilege Escalation: Given that exploitation requires administrator access, any compromise of this vulnerability could enable attackers to escalate their privileges. This is particularly concerning as administrators typically have extensive rights over system operations and configurations, making the system more vulnerable to sophisticated attacks.

  3. System Integrity Compromise: The execution of arbitrary commands not only threatens data confidentiality but also the overall integrity of the system. Attackers could modify system configurations, install backdoors, or disrupt normal operations, resulting in downtime and potentially affecting the entire development lifecycle of the organization.

Affected Version(s)

Enterprise Server 3.20.0

Enterprise Server 3.20.0 < 3.20.1

Enterprise Server 3.19.0 <= 3.19.4

References

CVSS V4

Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Seokchan Yoon
.