CVE-2026-0573

An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-controlled redirects to leak sensitive authorization tokens. The repository_pages API insecurely followed HTTP redirects when fetching artifact URLs, preserving the authorization header containing a privileged JWT. An authenticated user could redirect these requests to an attacker-controlled domain, exfiltrate the Actions.ManageOrgs JWT, and leverage it for potential remote code execution. Attackers would require access to the target GitHub Enterprise Server instance and the ability to exploit a legacy redirect to an attacker-controlled domain. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.19 and was fixed in versions 3.19.2, 3.18.4, 3.17.10, 3.16.13, 3.15.17, and 3.14.22. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

19 Feb 2026, 22:49

Type Values Removed Values Added
References () https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.22 - () https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.22 - Product, Release Notes
References () https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.17 - () https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.17 - Product, Release Notes
References () https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.13 - () https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.13 - Product, Release Notes
References () https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.10 - () https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.10 - Product, Release Notes
References () https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.4 - () https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.4 - Product, Release Notes
References () https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.2 - () https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.2 - Product, Release Notes
First Time Github
Github enterprise Server
Summary
  • (es) Una vulnerabilidad de redirección de URL fue identificada en GitHub Enterprise Server la cual permitía a las redirecciones controladas por el atacante filtrar tokens de autorización sensibles. La API repository_pages seguía de forma insegura las redirecciones HTTP al obtener URLs de artefactos, preservando el encabezado de autorización que contenía un JWT privilegiado. Un usuario autenticado podía redirigir estas solicitudes a un dominio controlado por el atacante, exfiltrar el JWT de Actions.ManageOrgs y aprovecharlo para una posible ejecución remota de código. Los atacantes requerirían acceso a la instancia de GitHub Enterprise Server objetivo y, también, la capacidad de explotar una redirección heredada a un dominio controlado por el atacante. Esta vulnerabilidad afectó a todas las versiones de GitHub Enterprise Server anteriores a la 3.19 y fue corregida en las versiones 3.19.2, 3.18.4, 3.17.10, 3.16.13, 3.15.17 y 3.14.22. Esta vulnerabilidad fue reportada a través del programa GitHub Bug Bounty.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.0
CPE cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

18 Feb 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 21:16

Updated : 2026-02-19 22:49


NVD link : CVE-2026-0573

Mitre link : CVE-2026-0573

CVE.ORG link : CVE-2026-0573


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')