Redshell — Turn on cybersecurity
Back to articlescybersecurity

GitHub's Git Push RCE: A Single Command Compromises Millions of Repositories

Wiz researchers disclosed CVE-2026-3854, a critical remote code execution vulnerability in GitHub that allows attackers to execute arbitrary commands on backend infrastructure using just a single git push. The flaw enables cross-tenant access to millions of repositories on GitHub.com.

April 29, 20268 min read
GitHub's Git Push RCE: A Single Command Compromises Millions of Repositories

The Vulnerability: CVE-2026-3854 Explained

The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access to a repository to achieve remote code execution on the instance. The vulnerability was discovered by researchers at Wiz, a cloud security firm, and represents one of the most critical threats to GitHub's infrastructure in recent memory.

On April 28, 2026, researchers at Wiz submitted a vulnerability report through GitHub's Bug Bounty program describing a critical remote code execution vulnerability affecting github.com, GitHub Enterprise Cloud, GitHub Enterprise Cloud with Data Residency, GitHub Enterprise Cloud with Enterprise Managed Users, and GitHub Enterprise Server.

The Attack Surface: How Git Push Becomes Code Execution

The vulnerability stems from improper handling of user-supplied input in GitHub's internal git infrastructure. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers.

GitHub's internal architecture uses multiple services to process a git push, passing security-critical configuration metadata via an internal header named X-Stat. The primary entry service, babeld, copied user-controlled git push options directly into this internal header without sanitizing semicolon characters. Because the X-Stat header uses semicolons as field delimiters, attackers could inject their own metadata fields by simply including semicolons in their push options.

A single git push command was enough to exploit a flaw in GitHub's internal protocol and achieve code execution on backend infrastructure. This simplicity—requiring no special malware, no stolen credentials, and no sophisticated social engineering—makes the vulnerability particularly dangerous.

Impact on GitHub.com and Enterprise Customers

The blast radius of this vulnerability is staggering. Given GitHub's multi-tenant architecture and its shared backend infrastructure, obtaining code execution on GitHub.com enabled cross-tenant exposure, effectively allowing an attacker to read millions of repositories on the shared storage node, irrespective of the organization or user.

On GitHub.com, this vulnerability allowed remote code execution on shared storage nodes. Millions of public and private repositories belonging to other users and organizations were accessible on the affected nodes.

For GitHub Enterprise Server customers, the impact was equally severe. On Enterprise Server, it could lead to full system compromise, including access to all repositories and sensitive internal data. At the time of disclosure, data indicated that 88% of instances were still vulnerable.

Discovery and Rapid Response

The timeline of this incident demonstrates both the severity of the flaw and GitHub's response capability. On March 4, 2026, Wiz Research discovered the X-Stat push option injection vulnerability. RCE was confirmed on GHES 3.19.1. Wiz Research reported the vulnerability to GitHub on March 4, and GitHub acknowledged receipt the same day. GitHub deployed a fix on GitHub.com on March 4. CVE-2026-3854 was assigned with CVSS 8.7 on March 10. GHES patch was released on March 10. Public disclosure occurred on April 28.

In less than two hours GitHub had validated the finding, deployed a fix to github.com, and begun a forensic investigation that concluded there was no exploitation. This rapid response prevented what could have been a catastrophic breach affecting the entire software development ecosystem.

Technical Depth: The Root Cause

The vulnerability exploited a fundamental assumption in GitHub's internal protocol design. When code is pushed to GitHub, internal services exchange metadata about the operation. The flaw arose because user-supplied git push options were not properly sanitized and were embedded into this metadata. Attackers could exploit delimiter handling to inject extra fields, tricking downstream services into treating malicious input as trusted data.

This represents a classic input validation failure at a security-critical boundary. While developers often trust internal service-to-service communication, the failure to sanitize user input at the edge—where external data enters the system—created a path to privilege escalation.

Affected Versions and Patching Requirements

The flaw was fixed in Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6, and 3.19.3.

GitHub Enterprise Server requires immediate action. Administrators should upgrade to GHES version 3.19.3 or later - this release patches CVE-2026-3854.

GitHub.com and GitHub Enterprise Cloud users do not require immediate action, as GitHub deployed fixes to these services within hours of discovery. However, GitHub Enterprise Server administrators face a critical window of vulnerability remediation.

Discovery Method: AI-Assisted Vulnerability Research

The discovery of this vulnerability marked a significant moment in the evolution of security research. CVE-2026-3854 was discovered by Wiz researchers through AI-augmented reverse engineering of closed-source compiled binaries. This indicates that vulnerability research methodologies are advancing, with AI-assisted analysis of compiled code enabling discovery of flaws that might otherwise remain hidden in proprietary systems.

Immediate Actions Required

For organizations using GitHub Enterprise Server, immediate action is critical:

  • Patch to GHES versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6, 3.19.3 or later immediately
  • Audit /var/log/github-audit.log for push operations containing unusual special characters in push option values as indicators of prior exploitation attempts
  • Review access logs for any suspicious git push operations during the vulnerability window
  • Verify that no unauthorized code changes were committed to critical repositories

For all GitHub users, this incident underscores the importance of:

  • Maintaining current security patches across all infrastructure components
  • Implementing strict code review processes to catch suspicious changes
  • Monitoring for unusual commit activity, especially from internal services
  • Maintaining audit logs with sufficient retention for forensic investigation

Broader Security Implications

This vulnerability exposes a critical truth in modern software infrastructure: security boundaries between internal and external systems are increasingly blurred. GitHub, as the world's largest code repository hosting platform, represents a high-value target for sophisticated attackers. The fact that a single git push could compromise millions of repositories demonstrates the catastrophic impact when security assumptions fail at critical junctures.

An investigation found no real-world exploitation beyond researchers' tests, and no customer data was compromised. This fortunate outcome should not create complacency—the next vulnerability may not be discovered and patched before widespread exploitation occurs.

Conclusion

CVE-2026-3854 represents a watershed moment in cloud security vulnerability research. The simplicity of exploitation combined with the massive blast radius—potentially affecting all software development globally—makes this one of the most critical vulnerabilities disclosed in 2026. The rapid response from GitHub's security team prevented catastrophe, but the incident serves as a stark reminder that even the world's most critical infrastructure contains exploitable flaws waiting for discovery.

Organizations must treat this as a critical priority for patching, and the security community should recognize this as evidence that traditional security testing methodologies may miss critical flaws in complex systems. The combination of AI-assisted analysis, responsible disclosure, and rapid incident response prevented what could have been a civilization-scale software supply chain compromise.

Stay in the loop

New articles and curated links—no spam.

Comments

Sign in to leave a comment

By commenting you agree to our guidelines: be respectful, no spam, no offensive language or explicit content.

Be the first to comment.