An incorrect regular expression vulnerability was identified in GitHub Enterprise Server that allowed an attacker to bypass OAuth redirect URI validation. An attacker with knowledge of a first-party OAuth application's registered callback URL could craft a malicious authorization link that, when clicked by a victim, would redirect the OAuth authorization code to an attacker-controlled domain. This could allow the attacker to gain unauthorized access to the victim's account with the scopes granted to the OAuth application. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.
References
| Link | Resource |
|---|---|
| https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.26 | Release Notes Vendor Advisory |
| https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21 | Release Notes Vendor Advisory |
| https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17 | Release Notes Vendor Advisory |
| https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14 | Release Notes Vendor Advisory |
| https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8 | Release Notes Vendor Advisory |
| https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5 | Release Notes Vendor Advisory |
| https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Apr 2026, 12:39
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Github
Github enterprise Server |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:github:enterprise_server:3.20.0:*:*:*:*:*:*:* cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* |
|
| References | () https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.26 - Release Notes, Vendor Advisory | |
| References | () https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21 - Release Notes, Vendor Advisory | |
| References | () https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17 - Release Notes, Vendor Advisory | |
| References | () https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14 - Release Notes, Vendor Advisory | |
| References | () https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8 - Release Notes, Vendor Advisory | |
| References | () https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5 - Release Notes, Vendor Advisory | |
| References | () https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1 - Release Notes, Vendor Advisory |
21 Apr 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-21 23:16
Updated : 2026-04-29 12:39
NVD link : CVE-2026-4296
Mitre link : CVE-2026-4296
CVE.ORG link : CVE-2026-4296
JSON object : View
Products Affected
github
- enterprise_server
CWE
CWE-185
Incorrect Regular Expression
