Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1355: CWE-862 Missing Authorization in GitHub Enterprise Server

0
Medium
VulnerabilityCVE-2026-1355cvecve-2026-1355cwe-862
Published: Wed Feb 18 2026 (02/18/2026, 20:42:07 UTC)
Source: CVE Database V5
Vendor/Project: GitHub
Product: Enterprise Server

Description

A Missing Authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to upload unauthorized content to another user’s repository migration export due to a missing authorization check in the repository migration upload endpoint. By supplying the migration identifier, an attacker could overwrite or replace a victim’s migration archive, potentially causing victims to download attacker-controlled repository data during migration restores or automated imports. An attacker would require authentication to the victim's GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.19.2, 3.18.5, 3.17.11, 3.16.14, 3.15.18, 3.14.23. This vulnerability was reported via the GitHub Bug Bounty program.

AI-Powered Analysis

AILast updated: 02/18/2026, 21:26:16 UTC

Technical Analysis

CVE-2026-1355 is a missing authorization vulnerability (CWE-862) identified in GitHub Enterprise Server, affecting all versions prior to 3.20. The flaw exists in the repository migration upload endpoint, where an attacker with authenticated access but limited privileges can supply a migration identifier to upload unauthorized content to another user’s repository migration export. This lack of proper authorization checks enables the attacker to overwrite or replace the victim’s migration archive. Consequently, when the victim performs migration restores or automated imports, they may unknowingly download and use attacker-controlled repository data, potentially compromising code integrity and trust. The vulnerability requires authentication but no additional user interaction, and the attack complexity is low due to the missing authorization check. The issue was responsibly disclosed via the GitHub Bug Bounty program and fixed in versions 3.19.2, 3.18.5, 3.17.11, 3.16.14, 3.15.18, and 3.14.23. The CVSS v4.0 base score is 6.0 (medium severity), reflecting network attack vector, low attack complexity, and partial impact on integrity with no impact on confidentiality or availability. No known exploits have been reported in the wild, but the vulnerability poses a risk to the integrity of repository data during migration processes.

Potential Impact

For European organizations, this vulnerability can undermine the integrity of critical source code and project data managed within GitHub Enterprise Server. Organizations relying on migration exports for backup, disaster recovery, or migration to new instances risk importing malicious or tampered code, which could introduce backdoors, vulnerabilities, or sabotage software supply chains. This can lead to compromised software products, intellectual property theft, or reputational damage. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk. The impact is particularly severe for organizations with strict compliance requirements around software integrity and provenance, such as those in finance, healthcare, and critical infrastructure sectors prevalent in Europe. Additionally, the disruption of development workflows and the potential need for forensic analysis and remediation could incur operational costs and delays.

Mitigation Recommendations

European organizations should immediately verify their GitHub Enterprise Server versions and upgrade to the fixed releases (3.19.2, 3.18.5, 3.17.11, 3.16.14, 3.15.18, or 3.14.23) to remediate this vulnerability. Beyond patching, organizations should enforce strict access controls and monitor repository migration activities for anomalies, such as unexpected migration exports or uploads. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise. Regularly audit user permissions to ensure least privilege principles are applied, especially for users with migration capabilities. Employ logging and alerting on migration endpoints to detect unauthorized attempts. Consider isolating migration operations to dedicated environments or time windows with enhanced monitoring. Finally, educate development and DevOps teams about the risks of repository migration tampering and encourage prompt reporting of suspicious activities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_P
Date Reserved
2026-01-22T19:14:46.710Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962af36aea4a407ae847e7

Added to database: 2/18/2026, 9:11:15 PM

Last enriched: 2/18/2026, 9:26:16 PM

Last updated: 2/21/2026, 12:15:09 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats