Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3582: CWE-862 Missing Authorization in GitHub Enterprise Server

0
Medium
VulnerabilityCVE-2026-3582cvecve-2026-3582cwe-862
Published: Tue Mar 10 2026 (03/10/2026, 18:56:56 UTC)
Source: CVE Database V5
Vendor/Project: GitHub
Product: Enterprise Server

Description

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with a classic personal access token (PAT) lacking the repo scope to retrieve issues and commits from private and internal repositories via the search REST API endpoints. The user must have had existing access to the repository through organization membership or as a collaborator for the vulnerability to be exploitable. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.16.15, 3.17.12, 3.18.6 and 3.19.3. This vulnerability was reported via the GitHub Bug Bounty program.

AI-Powered Analysis

AILast updated: 03/10/2026, 19:44:56 UTC

Technical Analysis

CVE-2026-3582 is an Incorrect Authorization vulnerability (CWE-862) found in GitHub Enterprise Server prior to version 3.20. The flaw allows an authenticated user possessing a classic personal access token (PAT) that lacks the 'repo' scope to retrieve sensitive data such as issues and commits from private and internal repositories. This is possible via the search REST API endpoints, which improperly authorize access based solely on the user's existing repository membership or collaborator status, without verifying the PAT's scope. The vulnerability affects versions 3.16.0 through 3.19.0 and was addressed in patch releases 3.16.15, 3.17.12, 3.18.6, and 3.19.3. The issue was responsibly disclosed through the GitHub Bug Bounty program. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low complexity, no user interaction, and limited impact on confidentiality. No known public exploits exist, and exploitation requires valid authentication and existing repository access, limiting the attack surface. The vulnerability highlights a gap in scope validation for PATs in API authorization logic.

Potential Impact

The vulnerability could lead to unauthorized disclosure of repository issues and commit data to authenticated users who do not have the appropriate PAT scope but do have repository membership or collaboration rights. This may expose sensitive project information, internal discussions, or code changes that organizations intended to restrict. While the impact is limited to users with some level of repository access, it undermines the principle of least privilege by allowing broader data access than intended. For organizations relying on GitHub Enterprise Server for secure code hosting and collaboration, this could increase insider threat risks or accidental data leaks. The lack of known exploits reduces immediate risk, but the widespread use of GitHub Enterprise Server in enterprises globally means many organizations could be affected if not patched. The vulnerability does not allow privilege escalation or access to repositories without membership, limiting its severity but still posing a confidentiality risk.

Mitigation Recommendations

Organizations should promptly upgrade GitHub Enterprise Server to versions 3.16.15, 3.17.12, 3.18.6, 3.19.3, or later to apply the official fix. Until patched, administrators should audit and restrict the issuance of classic personal access tokens, ensuring tokens have appropriate scopes and are only granted to trusted users. Review repository membership and collaborator lists to minimize unnecessary access. Implement monitoring of API usage patterns for anomalous search queries that could indicate exploitation attempts. Consider enforcing the use of fine-grained personal access tokens where possible, as they provide better scope control. Regularly review GitHub Enterprise Server security advisories and subscribe to vendor notifications for timely updates. Conduct internal security awareness training to inform users about the risks of token misuse and the importance of scope restrictions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_P
Date Reserved
2026-03-05T02:19:50.739Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b0713c2f860ef943a5fdec

Added to database: 3/10/2026, 7:30:04 PM

Last enriched: 3/10/2026, 7:44:56 PM

Last updated: 3/10/2026, 8:30:41 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses