Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1999: CWE-863 Incorrect Authorization in GitHub Enterprise Server

0
High
VulnerabilityCVE-2026-1999cvecve-2026-1999cwe-863
Published: Wed Feb 18 2026 (02/18/2026, 20:44:51 UTC)
Source: CVE Database V5
Vendor/Project: GitHub
Product: Enterprise Server

Description

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to merge their own pull request into a repository without having push access by exploiting an authorization bypass in the enable_auto_merge mutation for pull requests. This issue only affected repositories that allow forking as the attack relies on opening a pull request from an attacker-controlled fork into the target repository. Exploitation was only possible in specific scenarios. It required a clean pull request status and only applied to branches without branch protection rules enabled. This vulnerability affected GitHub Enterprise Server versions prior to 3.19.2, 3.18.5, and 3.17.11, and was fixed in versions 3.19.2, 3.18.5, and 3.17.11. This vulnerability was reported via the GitHub Bug Bounty program.

AI-Powered Analysis

AILast updated: 02/18/2026, 21:25:45 UTC

Technical Analysis

CVE-2026-1999 is an incorrect authorization vulnerability (CWE-863) in GitHub Enterprise Server that enables an attacker to bypass normal access controls and merge pull requests without having push permissions. The vulnerability arises from improper authorization checks in the enable_auto_merge GraphQL mutation for pull requests. Specifically, the flaw allows an attacker who can open a pull request from a forked repository to a target repository to merge their changes if the pull request is in a clean state and the target branch does not have branch protection rules enabled. This bypass circumvents the intended restriction that only users with push access can merge pull requests. The vulnerability affects GitHub Enterprise Server versions prior to 3.19.2, 3.18.5, and 3.17.11, and was responsibly disclosed via the GitHub Bug Bounty program. Exploitation requires authenticated access with at least limited permissions to create pull requests but does not require user interaction beyond that. The vulnerability has a CVSS 4.0 base score of 7.1, reflecting its network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity. There are no known public exploits or reports of active exploitation in the wild. The issue is mitigated by applying the vendor patches and by enabling branch protection rules on critical branches to prevent unauthorized merges.

Potential Impact

For European organizations using GitHub Enterprise Server, this vulnerability poses a significant risk to the integrity of their source code repositories. An attacker exploiting this flaw could merge unauthorized code changes, potentially introducing malicious code, backdoors, or vulnerabilities into production software. This could lead to compromised software supply chains, intellectual property theft, or disruption of development workflows. The impact is especially critical for organizations with sensitive or regulated software development processes, such as financial institutions, healthcare providers, and critical infrastructure operators. Since the vulnerability requires repositories to allow forking and branches without protection, organizations with less stringent repository policies are at higher risk. The ability to bypass push access controls undermines trust in code review and approval processes, potentially leading to reputational damage and compliance violations under European data protection and cybersecurity regulations.

Mitigation Recommendations

European organizations should immediately verify their GitHub Enterprise Server versions and upgrade to 3.19.2, 3.18.5, or 3.17.11 or later to apply the official patches. In parallel, organizations should enforce branch protection rules on all critical branches to prevent unauthorized merges, including requiring status checks, code reviews, and restricting who can push or merge. Restrict repository forking permissions where possible, especially for sensitive projects, to reduce the attack surface. Review and tighten user permissions to ensure that only trusted users can create pull requests or enable auto-merge features. Implement monitoring and alerting on unusual pull request merges or auto-merge enablement activities. Conduct audits of recent merges for suspicious activity. Finally, educate development teams about the importance of branch protection and secure repository configuration to prevent similar risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_P
Date Reserved
2026-02-05T17:14:39.098Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962af36aea4a407ae847ef

Added to database: 2/18/2026, 9:11:15 PM

Last enriched: 2/18/2026, 9:25:45 PM

Last updated: 2/21/2026, 12:18:18 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats