Description
An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated attacker to determine the names of private repositories by their numeric ID. The mobile upload policy API endpoint did not perform an early authorization check, and validation error messages included the full repository name for repositories the caller did not have access to. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, and 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.
Published: 2026-04-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch Immediately
AI Analysis

Impact

An improper authorization flaw in the mobile upload policy API of GitHub Enterprise Server allowed an authenticated attacker to learn the names of private repositories by their numeric IDs. When the API produced a validation error, the response contained the full repository name even for repositories the caller could not access. The weakness is a classic CWE‑201 situation where authorization is omitted, enabling confidential information to be exposed to users who do not have permission to view it. The CVSS score of 5.3 indicates a moderate risk to confidentiality.

Affected Systems

The vulnerability affects all GitHub Enterprise Server releases prior to 3.21. Fixes have been applied in 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, and 3.14.26. Ops teams should verify which exact minor release they are running and plan to upgrade to a patched version.

Risk and Exploitability

The likely attack vector is an authenticated request to the mobile upload policy endpoint, as the vulnerability is triggered by a validation error from this API. Because the attacker needs any authenticated session with the server, the exploit is feasible for users with compromised or reused credentials. The EPSS score is not available, and the vulnerability is not in the CISA KEV, but the CVSS of 5.3 and the fact that the flaw is purely informational still present a meaningful threat to confidentiality. Organizations should treat this as an elevated risk until the server is updated.

Generated by OpenCVE AI on April 22, 2026 at 06:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GitHub Enterprise Server to version 3.21 or any of the patched releases (3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, or 3.14.26).
  • Verify that the mobile upload policy API does not expose repository names in error messages and enforce early authorization for all requests.
  • Restrict access to the mobile upload policy endpoint to users with legitimate repository permission and monitor for abnormal API usage patterns.

Generated by OpenCVE AI on April 22, 2026 at 06:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
First Time appeared Github
Github enterprise Server
Vendors & Products Github
Github enterprise Server

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated attacker to determine the names of private repositories by their numeric ID. The mobile upload policy API endpoint did not perform an early authorization check, and validation error messages included the full repository name for repositories the caller did not have access to. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, and 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.
Title Improper authorization vulnerability in GitHub Enterprise Server allowed disclosure of private repository names via mobile upload policy API
Weaknesses CWE-201
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N'}


Subscriptions

Github Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_P

Published:

Updated: 2026-04-22T17:39:01.520Z

Reserved: 2026-04-03T18:21:52.907Z

Link: CVE-2026-5512

cve-icon Vulnrichment

Updated: 2026-04-22T17:38:55.515Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-21T23:16:22.297

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-5512

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T06:30:10Z

Weaknesses