CVE-2026-3582

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with a classic personal access token (PAT) lacking the repo scope to retrieve issues and commits from private and internal repositories via the search REST API endpoints. The user must have had existing access to the repository through organization membership or as a collaborator for the vulnerability to be exploitable. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.16.15, 3.17.12, 3.18.6 and 3.19.3. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

12 Mar 2026, 18:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CPE cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
First Time Github
Github enterprise Server
References () https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.15 - () https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.15 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.12 - () https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.12 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.6 - () https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.6 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.3 - () https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.3 - Release Notes

11 Mar 2026, 13:52

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de autorización incorrecta fue identificada en GitHub Enterprise Server que permitía a un usuario autenticado con un token de acceso personal (PAT) clásico que carecía del alcance 'repo' recuperar incidencias y commits de repositorios privados e internos a través de los puntos finales de la API REST de búsqueda. El usuario debía tener acceso existente al repositorio a través de la membresía de la organización o como colaborador para que la vulnerabilidad fuera explotable. Esta vulnerabilidad afectó a todas las versiones de GitHub Enterprise Server anteriores a la 3.20 y fue corregida en las versiones 3.16.15, 3.17.12, 3.18.6 y 3.19.3. Esta vulnerabilidad fue reportada a través del programa GitHub Bug Bounty.

10 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-10 20:16

Updated : 2026-03-12 18:42


NVD link : CVE-2026-3582

Mitre link : CVE-2026-3582

CVE.ORG link : CVE-2026-3582


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-862

Missing Authorization