Description
An authorization bypass vulnerability was identified in GitHub Enterprise Server that allowed an attacker with admin access on one repository to modify the secret scanning push protection delegated bypass reviewer list on another repository by manipulating the owner_id parameter in the request body. Authorization was verified against the repository in the URL, but the action was applied to a different repository specified in the request body. The impact is limited to assigning existing trusted users as bypass reviewers; it does not allow adding arbitrary external users. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7, 3.19.4 and 3.20.1. This vulnerability was reported via the GitHub Bug Bounty program.
Published: 2026-04-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass allowing cross‑repository modification of delegated bypass reviewers
Action: Apply Patch
AI Analysis

Impact

An attacker who already has admin rights on one GitHub Enterprise Server repository can alter the secret‑scanning push protection delegated bypass reviewer list on a different repository by sending a request that changes the owner_id parameter in the request body. This achieves an authorization bypass that lets the attacker assign existing trusted users as bypass reviewers on the target repository. The flaw does not allow the addition of arbitrary external users, so the impact is limited to re‑assigning trusted reviewers rather than providing arbitrary access.

Affected Systems

GitHub Enterprise Server versions released before 3.21 are affected. The vulnerability was patched in releases 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7, 3.19.4, and 3.20.1. All earlier versions should be upgraded to a party that includes the fix.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. No EPSS data is available and the vulnerability is not listed in the CISA KEV catalog, suggesting a lower likelihood of widespread exploitation. An attacker would need to target a repository where they already possess admin privileges and craft a request that manipulates the owner_id field, so the attack vector is internal privilege escalation within the organization's own GitHub Enterprise Server instance.

Generated by OpenCVE AI on April 22, 2026 at 04:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Enterprise Server to a patched version—version 3.21 or later, or any of the releases that contain the fix (3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7, 3.19.4, or 3.20.1).
  • Limit administrative access to repositories that manage secret scanning push protection; ensure only trusted users are granted such privileges.
  • Monitor API activity and review logs for unauthorized changes to the bypass reviewer list, and audit configuration changes to detect potential abuse of this bypass.

Generated by OpenCVE AI on April 22, 2026 at 04:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Github
Github enterprise Server
Vendors & Products Github
Github enterprise Server

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description An authorization bypass vulnerability was identified in GitHub Enterprise Server that allowed an attacker with admin access on one repository to modify the secret scanning push protection delegated bypass reviewer list on another repository by manipulating the owner_id parameter in the request body. Authorization was verified against the repository in the URL, but the action was applied to a different repository specified in the request body. The impact is limited to assigning existing trusted users as bypass reviewers; it does not allow adding arbitrary external users. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7, 3.19.4 and 3.20.1. This vulnerability was reported via the GitHub Bug Bounty program.
Title Authorization bypass in GitHub Enterprise Server secret scanning push protection allows cross-repository modification of delegated bypass reviewers
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Github Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_P

Published:

Updated: 2026-04-21T22:23:25.045Z

Reserved: 2026-02-26T21:00:43.352Z

Link: CVE-2026-3307

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-21T23:16:19.950

Modified: 2026-04-21T23:16:19.950

Link: CVE-2026-3307

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:30:05Z

Weaknesses