Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1999: CWE-918 Server-Side Request Forgery (SSRF) in GitHub Enterprise Server

0
High
VulnerabilityCVE-2026-1999cvecve-2026-1999cwe-918
Published: Wed Feb 18 2026 (02/18/2026, 20:44:51 UTC)
Source: CVE Database V5
Vendor/Project: GitHub
Product: Enterprise Server

Description

A Server-Side Request Forgery (SSRF) vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user to access internal services bound to loopback or unspecified addresses, potentially disrupting background job processing, accessing administrative endpoints, metrics, and profiling data, or manipulating job queues. Exploitation required an authenticated user with permissions to configure webhooks (repository, organization, or GitHub App administrator privileges). This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, and 3.19.1. This vulnerability was reported via the GitHub Bug Bounty program.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 18:25:59 UTC

Technical Analysis

CVE-2026-1999 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918 affecting GitHub Enterprise Server prior to version 3.20. SSRF vulnerabilities allow attackers to induce the server to make HTTP requests to arbitrary internal or external resources. In this case, an authenticated user with permissions to configure webhooks—such as repository administrators, organization administrators, or GitHub App administrators—can exploit this flaw to send crafted requests to internal services bound to loopback (127.0.0.1) or unspecified addresses. This can lead to unauthorized access to sensitive internal endpoints, including administrative interfaces, metrics, profiling data, and job queue management APIs. Such access can disrupt background job processing or allow attackers to manipulate internal server state. The vulnerability does not require user interaction beyond authentication and leverages the server’s trust in internal network boundaries. The CVSS v4.0 score is 7.2 (high severity), reflecting network attack vector, low attack complexity, no user interaction, and limited privileges required. The vulnerability was responsibly disclosed via the GitHub Bug Bounty program and fixed in patch releases 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, and 3.19.1. No public exploits or active exploitation have been reported to date.

Potential Impact

The impact of CVE-2026-1999 is significant for organizations using vulnerable versions of GitHub Enterprise Server. An attacker with webhook configuration privileges can bypass network segmentation controls to access internal services that are normally inaccessible externally. This can lead to unauthorized disclosure of sensitive administrative data, metrics, and profiling information, potentially exposing operational details and vulnerabilities. Additionally, manipulation of job queues and disruption of background processing can degrade service availability and reliability. Since GitHub Enterprise Server is widely used by enterprises for source code management and CI/CD workflows, exploitation could compromise software development pipelines, leading to potential code integrity issues or delays in deployment. The requirement for authenticated access limits exposure to insider threats or compromised accounts with elevated permissions. However, given the critical role of GitHub Enterprise Server in software development lifecycles, the risk to confidentiality, integrity, and availability is high if exploited.

Mitigation Recommendations

To mitigate CVE-2026-1999, organizations should immediately upgrade GitHub Enterprise Server to one of the patched versions: 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, or 3.19.1, or later. Beyond patching, organizations should audit and restrict webhook configuration permissions to the minimum necessary users, ideally limiting this capability to trusted administrators. Implement network segmentation and firewall rules to restrict internal service accessibility even from the GitHub server itself, reducing the impact of SSRF attempts. Monitor logs for unusual webhook configuration changes or internal requests originating from GitHub Enterprise Server. Employ multi-factor authentication and strong access controls to reduce the risk of compromised accounts with elevated privileges. Regularly review and harden internal administrative endpoints and job queue management interfaces to require additional authentication or authorization. Finally, maintain an incident response plan that includes detection and remediation steps for SSRF exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_P
Date Reserved
2026-02-05T17:14:39.098Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962af36aea4a407ae847ef

Added to database: 2/18/2026, 9:11:15 PM

Last enriched: 3/3/2026, 6:25:59 PM

Last updated: 4/7/2026, 2:20:17 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses