GitHub RCE Vulnerability via Git Push Enables Server Compromise (CVE-2026-3854)

GitHub RCE Vulnerability via Git Push Enables Server Compromise (CVE-2026-3854)
You are here:

EXECUTIVE SUMMARY

A high-severity remote code execution vulnerability (CVE-2026-3854) in GitHub’s internal git infrastructure allows authenticated users to execute arbitrary code via a single git push. The flaw stems from improper input sanitization in internal service communication, enabling command injection and sandbox bypass. Successful exploitation could lead to full server compromise and cross-tenant data exposure, particularly in GitHub Enterprise Server environments.

  • CVE: CVE-2026-3854
  • CVSS: 8.7 (High)
  • Active Region: Global
  • Affected Sector: IT, Software Development, Cloud & DevOps Platforms
  • Affected Product: GitHub.com, GitHub Enterprise Cloud, GitHub Enterprise Server (GHES ≤ 3.19.1)
  • Severity: High (RCE leading to full server compromise and cross-tenant data exposure)
  • Published Date: April 28, 2026

TECHNICAL DETAILS

This is a command injection vulnerability (CWE-77) caused by improper sanitization of user-controlled input in GitHub’s internal git processing pipeline. Specifically, user-supplied git push options are incorporated into an internal X-Stat header without proper validation, allowing attackers to inject arbitrary key-value pairs that can influence backend processing.

  • Target: GitHub’s internal git processing components, including babeld, gitauth, gitrpcd, and pre-receive hooks, particularly in how metadata is propagated via internal headers.
  • Root Cause: Failure to properly sanitize special characters (e.g., semicolon delimiters) in user-controlled input, enabling injection into trusted inter-service communication.
  • Prerequisite For Exploitation: Exploitation requires an authenticated user with push access to a repository. The attacker must be able to supply crafted git……

Download the Report

Date

Share

Previous Reports