Description
A reflected HTML injection vulnerability was identified in the GitHub Enterprise Server Management Console login page that could allow credential theft. The redirect_to query parameter on the /setup/unlock endpoint was reflected into an HTML attribute without proper sanitization, enabling an attacker to inject a form element that could capture administrator credentials. Exploitation required an administrator to click a crafted link and enter their credentials. This vulnerability affected GitHub Enterprise Server versions 3.19.1 through 3.19.5 and 3.20.0 through 3.20.1, and was fixed in versions 3.19.6 and 3.20.2. This vulnerability was reported via the GitHub Bug Bounty program.
Published: 2026-05-07
Score: 5.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A reflected HTML injection flaw exists in the GitHub Enterprise Server Management Console login page. The redirect_to query parameter on the /setup/unlock endpoint is inserted directly into an HTML attribute without sanitization, allowing an attacker to embed a malicious form that captures credentials. An admin who clicks a crafted link and enters their username and password could have those credentials harvested. This issue does not provide remote code execution but enables credential theft through a user‑interaction attack.

Affected Systems

GitHub Enterprise Server is affected. Versions 3.19.1 through 3.19.5 and 3.20.0 through 3.20.1 contain the flaw, while versions 3.19.6 and 3.20.2 contain the fix.

Risk and Exploitability

With a CVSS score of 5.9 the vulnerability is of moderate risk. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, which suggests it has not yet been widely exploited. Exploitation requires social engineering – an attacker would need to deliver a link to an administrator and rely on the admin to click it and submit credentials. The required user interaction and the lack of a propagation mechanism keep the attack surface relatively low, but the potential for credential compromise makes the risk significant for systems where privileged accounts are at stake.

Generated by OpenCVE AI on May 7, 2026 at 22:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GitHub Enterprise Server to the patched releases (v3.19.6 or v3.20.2).
  • Enable multi‑factor authentication for all administrator accounts to reduce the impact of any credential compromise.
  • Provide phishing awareness training so that administrators recognize and avoid malicious links designed to capture login information.

Generated by OpenCVE AI on May 7, 2026 at 22:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Github
Github enterprise Server
Vendors & Products Github
Github enterprise Server

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
Description A reflected HTML injection vulnerability was identified in the GitHub Enterprise Server Management Console login page that could allow credential theft. The redirect_to query parameter on the /setup/unlock endpoint was reflected into an HTML attribute without proper sanitization, enabling an attacker to inject a form element that could capture administrator credentials. Exploitation required an administrator to click a crafted link and enter their credentials. This vulnerability affected GitHub Enterprise Server versions 3.19.1 through 3.19.5 and 3.20.0 through 3.20.1, and was fixed in versions 3.19.6 and 3.20.2. This vulnerability was reported via the GitHub Bug Bounty program.
Title Reflected HTML injection vulnerability in GitHub Enterprise Server Management Console login page allowed credential theft
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Github Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_P

Published:

Updated: 2026-05-07T21:18:59.259Z

Reserved: 2026-05-07T14:46:18.902Z

Link: CVE-2026-8106

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-07T22:16:37.377

Modified: 2026-05-07T22:16:37.377

Link: CVE-2026-8106

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T22:30:36Z

Weaknesses