CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

GitHub CVE-2026-3854 remote code execution flaw via crafted git push

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A critical command injection vulnerability, tracked as CVE-2026-3854 with a CVSS score of 8.7, was disclosed in GitHub.com and GitHub Enterprise Server that allowed authenticated users with push access to achieve remote code execution via a single "git push" command. The flaw stemmed from inadequate sanitization of user-supplied push option values, which were incorporated into internal service headers during git push operations. By injecting crafted push option values containing semicolons, an attacker could manipulate internal metadata and bypass sandboxing protections, ultimately executing arbitrary commands as the git user. Due to GitHub's multi-tenant architecture, exploitation of this vulnerability on GitHub.com could enable cross-tenant access, allowing an attacker to read repositories across multiple organizations on shared storage nodes.

Timeline

  1. 28.04.2026 21:19 1 articles · 2h ago

    CVE-2026-3854 remote code execution vulnerability in GitHub addressed

    GitHub disclosed CVE-2026-3854, a critical command injection vulnerability in GitHub.com and GitHub Enterprise Server that allowed authenticated users with push access to achieve remote code execution via a single "git push" command. The flaw was introduced by insufficient sanitization of user-supplied git push option values, which enabled injection of semicolon-delimited metadata into internal headers. Exploitation involved a three-stage chain—bypassing sandboxing, redirecting hook execution, and executing arbitrary commands as the git user—resulting in full instance compromise. GitHub deployed a fix to GitHub.com within two hours of being notified by Wiz on March 4, 2026, and subsequently released patches for affected GitHub Enterprise Server versions. No active exploitation has been observed.

    Show sources

Information Snippets