CVE-2026-4296

An incorrect regular expression vulnerability was identified in GitHub Enterprise Server that allowed an attacker to bypass OAuth redirect URI validation. An attacker with knowledge of a first-party OAuth application's registered callback URL could craft a malicious authorization link that, when clicked by a victim, would redirect the OAuth authorization code to an attacker-controlled domain. This could allow the attacker to gain unauthorized access to the victim's account with the scopes granted to the OAuth application. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:3.20.0:*:*:*:*:*:*:*

History

29 Apr 2026, 12:39

Type Values Removed Values Added
First Time Github
Github enterprise Server
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:github:enterprise_server:3.20.0:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
References () https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.26 - () https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.26 - Release Notes, Vendor Advisory
References () https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21 - () https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.21 - Release Notes, Vendor Advisory
References () https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17 - () https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.17 - Release Notes, Vendor Advisory
References () https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14 - () https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.14 - Release Notes, Vendor Advisory
References () https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8 - () https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.8 - Release Notes, Vendor Advisory
References () https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5 - () https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.5 - Release Notes, Vendor Advisory
References () https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1 - () https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.1 - Release Notes, Vendor Advisory

21 Apr 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-21 23:16

Updated : 2026-04-29 12:39


NVD link : CVE-2026-4296

Mitre link : CVE-2026-4296

CVE.ORG link : CVE-2026-4296


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-185

Incorrect Regular Expression