🚨 A critical RCE vulnerability in GitHub (CVE-2026-3854), discovered by Wiz researchers, allows remote code execution via a single malicious Git push. GitHub.com was silently patched within hours but organizations running self-hosted GitHub Enterprise must confirm their version is updated. For teams using GitHub in CI/CD or development workflows, this is a supply chain risk you cannot ignore. #cybersecurity #GitHub #RCE #SupplyChainSecurity #CISO
GitHub RCE Vulnerability CVE-2026-3854 Patched
More Relevant Posts
-
“Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single "git push" command. The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access to a repository to achieve remote code execution on the instance. "During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers," per a GitHub advisory for the vulnerability. "Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values." Google-owned cloud security firm Wiz has been credited with discovering and reporting the issue on March 4, 2026, with GitHub validating and deploying a fix to GitHub.com within two hours.” A critical GitHub vulnerability, CVE-2026-3854, could allow an authenticated user with repository push access to achieve remote code execution using a single git push command. The flaw came from improperly sanitized push options being passed into GitHub’s internal service headers, allowing attackers to inject metadata and potentially execute commands. GitHub patched GitHub.com within two hours, while Enterprise Server users must update to fixed versions. The issue is serious because GitHub sits at the center of many software supply chains. Even though there is no evidence of malicious exploitation, affected organizations should patch GitHub Enterprise Server immediately, review repository access, and monitor unusual push activity. This case shows how small internal protocol assumptions can create major platform-level risks. https://lnkd.in/gsaJzRsG #GitHubSecurity #RCE #SupplyChainSecurity #CyberSecurity #CyberCrime #Cybertronium #CybertroniumMalaysia
To view or add a comment, sign in
-
Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single "git push" command. The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access to a repository to achieve remote code execution on the instance. #Cybersecurity #InformationSecurity #remote #code #execution #Server #Systems #Authentication
To view or add a comment, sign in
-
A critical vulnerability hit GitHub this week. CVE-2026-3854. Authenticated users could run arbitrary commands on the backend with a single git push. GitHub.com was patched fast. 88% of self-hosted GitHub Enterprise instances are still vulnerable. Companies set up self-hosted infrastructure as a project. Install it. Configure it. Walk away. Then a year goes by. The patches stop getting applied. The team rotates. Nobody owns it. The thing keeps running because the people who built it left it stable. That works until it doesn't. The same shape shows up everywhere in small business automation. A VPS running n8n. A Docker container with a webhook handler somebody set up two years ago. A Zapier account with 40 zaps and three former employees as the email contacts. An audit catches the version drift, the credentials sitting in plain text, the workflow paused since March, the API key that should have been rotated. If you've got self-hosted anything in your stack and you haven't audited it this year, you're the 88%. #automation #cybersecurity #smallbusiness #infosec
To view or add a comment, sign in
-
Building in public is the only way to navigate a 2026 job market. 🛡️ I’ve officially launched my Enterprise Security & GRC Home Lab on GitHub. As an MBA in IT Management and Certified Ethical Hacker (CEH), I’m using this to bridge the gap between technical discovery and business-level risk mitigation. The Environment: 🔹 Windows 11 & Ubuntu Server: Hardened targets for testing GPOs and NIST/CIS benchmarks. 🔹 Kali Linux & Parrot OS: Offensive nodes for vulnerability research and security auditing. The Goal: Providing firms with the security maturity they need through fractional advisory and rapid risk assessments. Check out the architecture here: 👉 github.com #Cybersecurity #GRC #vCISO #ITManagement #CEH #InfoSec
To view or add a comment, sign in
-
One of the more interesting GitHub Advanced Security updates I’ve seen recently is the addition of deployment context directly into repository properties and security alerts. You can now see which repos are actually deployed, where they’re running, and tie that back to the alerts you’re looking at without having to piece it together yourself. That changes the conversation a bit. Not every alert carries the same weight, but most tools still treat them that way. When you can quickly tell what’s tied to something live in production versus something sitting idle, prioritization gets a lot more practical. For anyone who cares about getting better signal out of their security alerts, this is a meaningful step forward. Having that extra layer of context makes it easier to focus on what actually matters and move faster when it counts. https://lnkd.in/en56tbSK
To view or add a comment, sign in
-
GitHub leaked webhook secrets in HTTP headers for four months. Between September and December 2025, a new webhook platform feature flag exposed secrets base64-encoded in X-Github-Encoded-Secret headers to any receiving endpoint. Fixed in January, but if you log request headers, those secrets are sitting in your logs right now. #GitHub #Security #WebSecurity #DevOps https://github.com
To view or add a comment, sign in
-
Critical GitHub RCE bug exposed millions of repositories A critical command injection flaw in GitHub's server-side git push processing pipeline, tracked as CVE-2026-3854, carried a CVSS score of 8.8 and was patched in Enterprise Server versions 3.14.25 through 3.20.0. The vulnerability resided in an internal component called X-STAT, where crafted push requests could inject arbitrary commands into backend execution. On GitHub.com, this enabled remote code execution on shared storage nodes with access to millions of public and private repositories across tenant boundaries. For self-hosted Enterprise Server deployments, the flaw permitted full server compromise including all repositories and internal secrets. Wiz researchers disclosed that 88% of internet-facing Enterprise Server instances remained unpatched at the time of public disclosure, despite GitHub releasing fixes within hours of the report on March 4, 2026. The finding is notable for its reported use of AI-augmented reverse engineering tooling, IDA MCP, in identifying the vulnerability within closed-source binaries. GitHub's CISO Alexis Wales confirmed the bug earned one of the highest rewards in the company's Bug Bounty programme. This cross-tenant exposure on shared infrastructure brings into light what repository access logs GitHub retains and whether those logs would support attribution of any actual exploitation prior to the March 2026 patch window. #cybersecurity #australiancybersecurity #aics #github #rce #cve20263854 #commandinjection #bugbounty Wiz GitHub Australian Institute of Cyber Security (AICS) https://lnkd.in/gXwZzUmP
To view or add a comment, sign in
-
Critical GitHub RCE bug exposed millions of repositories A critical command injection flaw in GitHub's server-side git push processing pipeline, tracked as CVE-2026-3854, carried a CVSS score of 8.8 and was patched in Enterprise Server versions 3.14.25 through 3.20.0. The vulnerability resided in an internal component called X-STAT, where crafted push requests could inject arbitrary commands into backend execution. On GitHub.com, this enabled remote code execution on shared storage nodes with access to millions of public and private repositories across tenant boundaries. For self-hosted Enterprise Server deployments, the flaw permitted full server compromise including all repositories and internal secrets. Wiz researchers disclosed that 88% of internet-facing Enterprise Server instances remained unpatched at the time of public disclosure, despite GitHub releasing fixes within hours of the report on March 4, 2026. The finding is notable for its reported use of AI-augmented reverse engineering tooling, IDA MCP, in identifying the vulnerability within closed-source binaries. GitHub's CISO Alexis Wales confirmed the bug earned one of the highest rewards in the company's Bug Bounty programme. This cross-tenant exposure on shared infrastructure brings into light what repository access logs GitHub retains and whether those logs would support attribution of any actual exploitation prior to the March 2026 patch window. #cybersecurity #australiancybersecurity #aics #github #rce #cve20263854 #commandinjection #bugbounty Wiz GitHub Australian Institute of Cyber Security (AICS) https://lnkd.in/g8aexjpm
To view or add a comment, sign in
-
In 2026, the CI/CD pipeline has emerged as a significant security risk, particularly concerning supply chain attacks. Notably, between March and April 2026, the TeamPCP and Shai-Hulud campaigns compromised several tools, including Trivy, KICS, LiteLLM, @bitwarden/cli, and intercom-client, using similar attack vectors: - Mutable tag hijacking: Force-pushing malicious code to trusted GitHub Action tags. - Stolen GitHub PATs and publish tokens: reused for lateral movement across repositories and pipelines. - Runner memory scanning: Recovering secrets from runner memory that are masked in logs but still present at runtime. - Exfiltration via the victim’s own private GitHub repositories, blending into trusted outbound traffic and often bypassing egress controls. These attacks can execute without modifying application code directly and often avoid exposing secrets in logs. To address this issue, François Proulx and boostsecurity.io have developed SmokedMeat, an open-source red team framework designed to run this specific kill chain against your organization. It functions similarly to Metasploit but focuses on GitHub Actions: - Recon: Scans workflows for injection flaws and over-permissive tokens - Exploit: Auto-crafts payloads via PR, issue, or comment - Post-exploit: Sweeps runner memory for masked secrets - Pivot: Exchanges OIDC tokens for AWS/GCP/Azure access For more information, check out the blog: https://lnkd.in/ghxGBxrC Explore the GitHub repository: https://lnkd.in/gGNQ54sM
To view or add a comment, sign in
-
🚀 Built My Own Auto Network Defense System! I recently developed a hands-on cybersecurity project focused on detecting and preventing SSH brute-force attacks in real time. 🔐 Key Highlights: • Performed reconnaissance using Nmap • Simulated brute-force attacks using Hydra (Kali Linux) • Developed a Bash script for real-time log monitoring • Automatically blocked attacker IPs using iptables • Implemented auto-unblock mechanism • Verified network traffic using Wireshark 📊 Result: Successfully detected and blocked unauthorized access attempts dynamically, preventing brute-force attacks in real time. 🧠 What I Learned: • Complete attack lifecycle (Reconnaissance → Exploitation → Defense) • Practical usage of Linux security tools • Log analysis and real-time monitoring • Network traffic analysis and packet inspection 🛠️ Tools & Technologies: Kali Linux | RedHat Linux | Nmap | Hydra | Bash | iptables | Wireshark 🚀 Future Improvements: • Integrate alert system (email/notification) • Build a simple dashboard for monitoring attacks • Extend detection to other services (FTP, HTTP) • Integrate with SIEM tools for enterprise-level security 🔗 GitHub Repository: https://lnkd.in/g-TS9sn8 This project strengthened my understanding of both offensive (CEH) and defensive (SOC) cybersecurity domains. #CyberSecurity #EthicalHacking #Nmap #Wireshark #Linux #SOC #CEH #GitHub #NetworkSecurity
To view or add a comment, sign in
More from this author
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development