GitHub RCE Vulnerability CVE-2026-3854 Exploited by Authenticated Users

A critical remote code execution vulnerability (CVE-2026-3854, CVSS 8.7) was recently disclosed in GitHub’s internal git infrastructure that could be exploited by any authenticated user with repository push access. The TTPs involved an injection flaw in the X-Stat header: attackers crafted git push options containing semicolons (;) to inject and override internal fields (such as rails_env, custom_hooks_dir, repo_pre_receive_hooks, and user_operator_mode on GitHub.com). This bypassed sandboxing and allowed execution of arbitrary code via pre-receive hooks using only a standard git client. Potential impact: - On GitHub Enterprise Server (GHES): Full server compromise, including access to all hosted repositories and internal secrets. - On GitHub.com: Remote code execution on shared storage nodes, with potential cross-tenant exposure to millions of public and private repositories. GitHub mitigated the issue on its cloud platform within hours and has released patches for all supported GHES versions (vulnerable ≤ 3.19.1; fixed in 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6, 3.19.3+). Self-hosted administrators should upgrade immediately. Full technical breakdown from Wiz Research: https://lnkd.in/eRThbsZJ #GitHub #RCE #Vulnerability #InfoSec #DevSecOps #AppSec #CVE20263854

To view or add a comment, sign in

Explore content categories