CVE-2026-1999: CWE-918 Server-Side Request Forgery (SSRF) in GitHub Enterprise Server
A Server-Side Request Forgery (SSRF) vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user to access internal services bound to loopback or unspecified addresses, potentially disrupting background job processing, accessing administrative endpoints, metrics, and profiling data, or manipulating job queues. Exploitation required an authenticated user with permissions to configure webhooks (repository, organization, or GitHub App administrator privileges). This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, and 3.19.1. This vulnerability was reported via the GitHub Bug Bounty program.
AI Analysis
Technical Summary
CVE-2026-1999 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918 affecting GitHub Enterprise Server prior to version 3.20. SSRF vulnerabilities allow attackers to induce the server to make HTTP requests to arbitrary internal or external resources. In this case, an authenticated user with permissions to configure webhooks—such as repository administrators, organization administrators, or GitHub App administrators—can exploit this flaw to send crafted requests to internal services bound to loopback (127.0.0.1) or unspecified addresses. This can lead to unauthorized access to sensitive internal endpoints, including administrative interfaces, metrics, profiling data, and job queue management APIs. Such access can disrupt background job processing or allow attackers to manipulate internal server state. The vulnerability does not require user interaction beyond authentication and leverages the server’s trust in internal network boundaries. The CVSS v4.0 score is 7.2 (high severity), reflecting network attack vector, low attack complexity, no user interaction, and limited privileges required. The vulnerability was responsibly disclosed via the GitHub Bug Bounty program and fixed in patch releases 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, and 3.19.1. No public exploits or active exploitation have been reported to date.
Potential Impact
The impact of CVE-2026-1999 is significant for organizations using vulnerable versions of GitHub Enterprise Server. An attacker with webhook configuration privileges can bypass network segmentation controls to access internal services that are normally inaccessible externally. This can lead to unauthorized disclosure of sensitive administrative data, metrics, and profiling information, potentially exposing operational details and vulnerabilities. Additionally, manipulation of job queues and disruption of background processing can degrade service availability and reliability. Since GitHub Enterprise Server is widely used by enterprises for source code management and CI/CD workflows, exploitation could compromise software development pipelines, leading to potential code integrity issues or delays in deployment. The requirement for authenticated access limits exposure to insider threats or compromised accounts with elevated permissions. However, given the critical role of GitHub Enterprise Server in software development lifecycles, the risk to confidentiality, integrity, and availability is high if exploited.
Mitigation Recommendations
To mitigate CVE-2026-1999, organizations should immediately upgrade GitHub Enterprise Server to one of the patched versions: 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, or 3.19.1, or later. Beyond patching, organizations should audit and restrict webhook configuration permissions to the minimum necessary users, ideally limiting this capability to trusted administrators. Implement network segmentation and firewall rules to restrict internal service accessibility even from the GitHub server itself, reducing the impact of SSRF attempts. Monitor logs for unusual webhook configuration changes or internal requests originating from GitHub Enterprise Server. Employ multi-factor authentication and strong access controls to reduce the risk of compromised accounts with elevated privileges. Regularly review and harden internal administrative endpoints and job queue management interfaces to require additional authentication or authorization. Finally, maintain an incident response plan that includes detection and remediation steps for SSRF exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Japan, France, Canada, Australia, Netherlands, India, South Korea
CVE-2026-1999: CWE-918 Server-Side Request Forgery (SSRF) in GitHub Enterprise Server
Description
A Server-Side Request Forgery (SSRF) vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user to access internal services bound to loopback or unspecified addresses, potentially disrupting background job processing, accessing administrative endpoints, metrics, and profiling data, or manipulating job queues. Exploitation required an authenticated user with permissions to configure webhooks (repository, organization, or GitHub App administrator privileges). This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, and 3.19.1. This vulnerability was reported via the GitHub Bug Bounty program.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1999 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918 affecting GitHub Enterprise Server prior to version 3.20. SSRF vulnerabilities allow attackers to induce the server to make HTTP requests to arbitrary internal or external resources. In this case, an authenticated user with permissions to configure webhooks—such as repository administrators, organization administrators, or GitHub App administrators—can exploit this flaw to send crafted requests to internal services bound to loopback (127.0.0.1) or unspecified addresses. This can lead to unauthorized access to sensitive internal endpoints, including administrative interfaces, metrics, profiling data, and job queue management APIs. Such access can disrupt background job processing or allow attackers to manipulate internal server state. The vulnerability does not require user interaction beyond authentication and leverages the server’s trust in internal network boundaries. The CVSS v4.0 score is 7.2 (high severity), reflecting network attack vector, low attack complexity, no user interaction, and limited privileges required. The vulnerability was responsibly disclosed via the GitHub Bug Bounty program and fixed in patch releases 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, and 3.19.1. No public exploits or active exploitation have been reported to date.
Potential Impact
The impact of CVE-2026-1999 is significant for organizations using vulnerable versions of GitHub Enterprise Server. An attacker with webhook configuration privileges can bypass network segmentation controls to access internal services that are normally inaccessible externally. This can lead to unauthorized disclosure of sensitive administrative data, metrics, and profiling information, potentially exposing operational details and vulnerabilities. Additionally, manipulation of job queues and disruption of background processing can degrade service availability and reliability. Since GitHub Enterprise Server is widely used by enterprises for source code management and CI/CD workflows, exploitation could compromise software development pipelines, leading to potential code integrity issues or delays in deployment. The requirement for authenticated access limits exposure to insider threats or compromised accounts with elevated permissions. However, given the critical role of GitHub Enterprise Server in software development lifecycles, the risk to confidentiality, integrity, and availability is high if exploited.
Mitigation Recommendations
To mitigate CVE-2026-1999, organizations should immediately upgrade GitHub Enterprise Server to one of the patched versions: 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, or 3.19.1, or later. Beyond patching, organizations should audit and restrict webhook configuration permissions to the minimum necessary users, ideally limiting this capability to trusted administrators. Implement network segmentation and firewall rules to restrict internal service accessibility even from the GitHub server itself, reducing the impact of SSRF attempts. Monitor logs for unusual webhook configuration changes or internal requests originating from GitHub Enterprise Server. Employ multi-factor authentication and strong access controls to reduce the risk of compromised accounts with elevated privileges. Regularly review and harden internal administrative endpoints and job queue management interfaces to require additional authentication or authorization. Finally, maintain an incident response plan that includes detection and remediation steps for SSRF exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_P
- Date Reserved
- 2026-02-05T17:14:39.098Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69962af36aea4a407ae847ef
Added to database: 2/18/2026, 9:11:15 PM
Last enriched: 3/3/2026, 6:25:59 PM
Last updated: 4/6/2026, 4:55:30 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.