Description
An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with a classic personal access token (PAT) lacking the repo scope to retrieve issues and commits from private and internal repositories via the search REST API endpoints. The user must have had existing access to the repository through organization membership or as a collaborator for the vulnerability to be exploitable. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.16.15, 3.17.12, 3.18.6 and 3.19.3. This vulnerability was reported via the GitHub Bug Bounty program.
Published: 2026-03-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to private and internal repository search results
Action: Apply patch
AI Analysis

Impact

An Incorrect Authorization flaw in GitHub Enterprise Server allows a user authenticated with a classic personal access token that lacks the repo scope to retrieve issues and commits from private and internal repositories through the search REST API endpoints. The weakness, identified as CWE-862, enables the attacker to read repository data that should be restricted, potentially exposing sensitive information, code, and issue histories. The impact is a moderation-level breach of confidentiality but does not provide code execution or persistence capabilities.

Affected Systems

GitHub Enterprise Server was affected in all releases prior to 3.20. The vulnerability was fixed in version 3.16.15, 3.17.12, 3.18.6, and 3.19.3, so any installation running an earlier version is at risk and must be updated. The fix eliminates the ability for a non‑repo‑scoped token to return search results from private or internal repositories that the user has access to via organization membership or collaboration.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk, and the EPSS score of less than 1% suggests low likelihood of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, further supporting a low imminent threat profile. However, to exploit the weakness a user must already possess repository access, which can mean a legitimate member or collaborator. Once authenticated, they can query the API and receive data that should require repo privileges, meaning that any compromised or malicious account with broad organization membership could surreptitiously harvest internal code and issue information. The attack vector is authenticated remote API use, inferred from the description; no local privilege escalation or code execution is required.

Generated by OpenCVE AI on April 16, 2026 at 03:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GitHub Enterprise Server to at least version 3.16.15, 3.17.12, 3.18.6, or 3.19.3 depending on your current release trajectory, ensuring the authorization fix is applied.
  • If your environment cannot be updated immediately, audit and revoke any classic personal access tokens that lack the repo scope, and require new tokens with the appropriate scopes for accessing repository data.
  • Limit search API usage for users who do not need to inspect private or internal repositories until the server is patched; consider disabling the search endpoint for non‑essential accounts or applying ACLs to restrict search results to authorized repositories.

Generated by OpenCVE AI on April 16, 2026 at 03:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Github
Github enterprise Server
Vendors & Products Github
Github enterprise Server

Tue, 10 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with a classic personal access token (PAT) lacking the repo scope to retrieve issues and commits from private and internal repositories via the search REST API endpoints. The user must have had existing access to the repository through organization membership or as a collaborator for the vulnerability to be exploitable. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.16.15, 3.17.12, 3.18.6 and 3.19.3. This vulnerability was reported via the GitHub Bug Bounty program.
Title Incorrect Authorization in GitHub Enterprise Server allows access to issue and commit search results without repo scope
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Github Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_P

Published:

Updated: 2026-03-11T14:13:44.860Z

Reserved: 2026-03-05T02:19:50.739Z

Link: CVE-2026-3582

cve-icon Vulnrichment

Updated: 2026-03-11T14:13:41.364Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T20:16:41.373

Modified: 2026-03-12T18:42:24.297

Link: CVE-2026-3582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T03:45:16Z

Weaknesses