{"id":745,"date":"2026-04-28T19:03:46","date_gmt":"2026-04-28T19:03:46","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=745"},"modified":"2026-04-28T19:03:46","modified_gmt":"2026-04-28T19:03:46","slug":"researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=745","title":{"rendered":"Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 28, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Software Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgztlzahKA2HwUQiNDerhbX2l415JinNIW5jaU5tgskPVHqpMhba_NorYL9SSWRzLdSPjSnsxZKQic97f8H2Bx2G0Dsjb58dcdFuZoL0c5Gno3BVvYa4vi62_PNr1Qh-kBYED7YbTPw3fqQklMmnoPV0b1KYaienKHzIAtBuktMqyVCxGU0u8Hkd-zzYeNU\/s1700-e365\/github.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single \u00abgit push\u00bb command.<\/p>\n<p>The flaw, tracked as <strong>CVE-2026-3854<\/strong> (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access to a repository to achieve remote code execution on the instance.<\/p>\n<p>\u00abDuring a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers,\u00bb per a <a href=\"https:\/\/github.com\/advisories\/GHSA-64fw-jx9p-5j24\">GitHub advisory<\/a> for the vulnerability. \u00abBecause the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values.\u00bb<\/p>\n<p>Google-owned cloud security firm Wiz has been credited with discovering and reporting the issue on March 4, 2026, with GitHub validating and deploying a fix to GitHub.com within two hours.<\/p>\n<p>The vulnerability has also been addressed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.8, 3.19.4, 3.20.0, or later. There is no evidence that the issue was ever exploited in a malicious context.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-security-guide-d-1\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRxP56rpa2W0O_0yc0xgs5l2r4FRV4Wiuq3IqWuFdsd_4g1c3oRVXoHtW9gxo8ObuxmyjqkAf3cD6N1JbVDos7QX99ZHtmeVrg-FUzSnMZLTl1ZFyiSkpqQiw6BcHXz52jr3s42xWEDFOpwWK6HgXOqscGMNkhA5pZK7h6zVV4dpDaLfgy17TidZXVrtUB\/s728-e100\/nudge-d-1.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>According to GitHub, the issue affects GitHub.com, GitHub Enterprise Cloud, GitHub Enterprise Cloud with Data Residency, GitHub Enterprise Cloud with Enterprise Managed Users, and GitHub Enterprise Server.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>At its core, the problem stems from the fact that user-supplied <a href=\"https:\/\/git-scm.com\/docs\/git-push#Documentation\/git-push.txt---push-optionoption\">git push options<\/a> are not adequately sanitized before the values were incorporated into the internal X-Stat header. Because the internal metadata format relies on a semicolon as a delimiter character that could also appear in the user input, a bad actor could exploit this oversight to inject arbitrary commands and have them executed.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAkGYZ8vs0N5vUfEzcIqnrxqxk5g_PmRxs6iq8fwMyskwxHZ7PvTtgzwL2h0ZPTqdb1F7AMFLES0fgmAXA_l2HTkIYfZT-SV-AGYjU6I7PXG8iJtT2ozpWUj6LPK-A8M81z3PRchxPNiwUSD08bHGAleNciXfEJYIpuc0MKs3ftvqjMDcb9TO3aua1ywid\/s1700-e365\/git-exploit.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiAkGYZ8vs0N5vUfEzcIqnrxqxk5g_PmRxs6iq8fwMyskwxHZ7PvTtgzwL2h0ZPTqdb1F7AMFLES0fgmAXA_l2HTkIYfZT-SV-AGYjU6I7PXG8iJtT2ozpWUj6LPK-A8M81z3PRchxPNiwUSD08bHGAleNciXfEJYIpuc0MKs3ftvqjMDcb9TO3aua1ywid\/s1700-e365\/git-exploit.jpg\" alt=\"\" border=\"0\" data-original-height=\"1463\" data-original-width=\"1920\"\/><\/a><\/div>\n<p>\u00abBy chaining several injected values together, the researchers demonstrated that an attacker could override the environment the push was processed in, bypass sandboxing protections that normally constrain hook execution, and ultimately execute arbitrary commands on the server,\u00bb GitHub&#8217;s Chief Information Security Officer, Alexis Wales, <a href=\"https:\/\/github.blog\/security\/securing-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability\/\">said<\/a>.<\/p>\n<p>Wiz, in a coordinated announcement, noted that the issue is \u00abremarkably easy\u00bb to exploit, adding that it allows remote code execution on shared storage nodes. About 88% of instances are currently vulnerable to the issue at the time of public disclosure. The remote code execution chain strings together three injections &#8211;<\/p>\n<ul>\n<li>Inject a non-production <strong>rails_env<\/strong> value to bypass the sandbox<\/li>\n<li>Inject <strong>custom_hooks_dir<\/strong> to control to redirectthe hook directory<\/li>\n<li>Inject <strong>repo_pre_receive_hooks<\/strong> with a crafted hook entry that triggers path traversal to execute arbitrary commands as the git user<\/li>\n<\/ul>\n<p>\u00abWith unsandboxed code execution as the git user, we had full control over the GHES instance, including filesystem read\/write access and visibility into internal service configuration,\u00bb Wiz security researcher Sagi Tzadik <a href=\"https:\/\/www.wiz.io\/blog\/github-rce-vulnerability-cve-2026-3854\">said<\/a>.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>As for GitHub.com, an enterprise mode flag \u2013 that&#8217;s set to \u00abtrue\u00bb for GitHub Enterprise Server \u2013 defaults to \u00abfalse,\u00bb rendering the custom hooks path inactive. But since this flag is also passed in the X-Stat header, it&#8217;s equally injectable using the same mechanism, thereby resulting in code execution on GitHub.com as well.<\/p>\n<p>To make matters worse, given GitHub&#8217;s multi-tenant architecture and its shared backend infrastructure, the company pointed out that obtaining code execution on GitHub.com enabled cross-tenant exposure, effectively allowing an attacker to read millions of repositories on the shared storage node, irrespective of the organization or user.<\/p>\n<p>In light of the severity of CVE-2026-3854, users are advised to apply the update immediately for optimal protection.<\/p>\n<p>\u00abA single git push command was enough to exploit a flaw in GitHub&#8217;s internal protocol and achieve code execution on backend infrastructure,\u00bb Wiz said. \u00abWhen multiple services written in different languages pass data through a shared internal protocol, the assumptions each service makes about that data become a critical attack surface.\u00bb<\/p>\n<p>\u00abWe encourage teams building multi-service architectures to audit how user-controlled input flows through internal protocols \u2013 especially where security-critical configuration is derived from shared data formats.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 28, 2026Vulnerability \/ Software Security Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":746,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[58,1459,1219,1460,70,1462,71,908,316,605,1461],"class_list":["post-745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-critical","tag-cve20263854","tag-discover","tag-exploitable","tag-flaw","tag-git","tag-github","tag-push","tag-rce","tag-researchers","tag-single"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=745"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/745\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/746"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}