Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Critical GitHub Vulnerability Exposed Millions of Repositories

0
Critical
Vulnerabilityremote
Published: Wed Apr 29 2026 (04/29/2026, 06:27:49 UTC)
Source: SecurityWeek

Description

CVE-2026-3854 is a critical remote code execution vulnerability affecting GitHub. com, GitHub Enterprise Server, and related GitHub Enterprise Cloud services. The flaw allows any authenticated user with push access to execute arbitrary commands on GitHub backend servers via a specially crafted git push command. On GitHub. com, exploitation could lead to remote code execution on shared storage nodes, exposing millions of public and private repositories. GitHub addressed the vulnerability promptly, deploying a fix on GitHub. com on March 4, 2026, and releasing a patch for Enterprise Server on March 10, 2026. A forensic investigation found no evidence of exploitation in the wild. However, a significant portion of Enterprise Server instances remain unpatched, posing ongoing risk. The vulnerability was discovered by Wiz using AI techniques and involves an injection flaw in GitHub's internal protocol.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/29/2026, 06:36:29 UTC

Technical Analysis

CVE-2026-3854 is a critical remote code execution vulnerability in GitHub's internal Git infrastructure impacting GitHub.com, GitHub Enterprise Server, and GitHub Enterprise Cloud variants. The vulnerability arises from an injection flaw in GitHub's internal protocol that allows any authenticated user with push access to execute arbitrary commands on backend servers using a standard git client. On GitHub Enterprise Server, this can lead to full server compromise and access to all repositories and internal secrets. On GitHub.com, it enables remote code execution on shared storage nodes, exposing millions of repositories. The vulnerability was reported on March 4, 2026, and fixed on the same day for GitHub.com, with a patch for Enterprise Server released on March 10. Despite the fix, 88% of Enterprise Server instances had not been updated at the time of reporting. No exploitation in the wild has been confirmed.

Potential Impact

The vulnerability allows authenticated users with push access to execute arbitrary commands on GitHub backend servers, potentially leading to full compromise of GitHub Enterprise Server instances and exposure of all repositories and internal secrets. On GitHub.com, it could enable remote code execution on shared storage nodes, exposing millions of public and private repositories to unauthorized access. The impact is critical due to the potential for complete server compromise and widespread data exposure. No evidence of exploitation in the wild has been found, but unpatched Enterprise Server instances remain at risk.

Mitigation Recommendations

GitHub has deployed an official fix for this vulnerability. GitHub.com was patched on March 4, 2026, and a patch for GitHub Enterprise Server was released on March 10, 2026. Organizations using GitHub Enterprise Server should apply the available patch immediately to mitigate the risk. GitHub has conducted a forensic investigation and found no exploitation in the wild. Users with push access should be aware of the risk until their instances are updated. No additional mitigation steps are indicated beyond applying the official patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/critical-github-vulnerability-exposed-millions-of-repositories/","fetched":true,"fetchedAt":"2026-04-29T06:36:21.706Z","wordCount":1022}

Threat ID: 69f1a6e5cbff5d8610b0fda9

Added to database: 4/29/2026, 6:36:21 AM

Last enriched: 4/29/2026, 6:36:29 AM

Last updated: 4/29/2026, 7:37:11 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses