An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed a user with read access to a repository and write access to a project to modify issue and pull request metadata through the project. When adding an item to a project that already existed, column value updates were applied without verifying the actor's repository write permissions. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.
References
Configurations
Configuration 1 (hide)
|
History
12 Mar 2026, 18:46
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| CPE | cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | |
| First Time |
Github
Github enterprise Server |
|
| References | () https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.24 - Release Notes | |
| References | () https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.19 - Release Notes | |
| References | () https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.15 - Release Notes | |
| References | () https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.12 - Release Notes | |
| References | () https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.6 - Release Notes | |
| References | () https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.3 - Release Notes |
11 Mar 2026, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Mar 2026, 18:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 18:19
Updated : 2026-03-12 18:46
NVD link : CVE-2026-3306
Mitre link : CVE-2026-3306
CVE.ORG link : CVE-2026-3306
JSON object : View
Products Affected
github
- enterprise_server
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
