CVE-2026-3306
Improper authorization in GitHub Projects allows modification of issue and pull request metadata without repository write access
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed a user with read access to a repository and write access to a project to modify issue and pull request metadata through the project. When adding an item to a project that already existed, column value updates were applied without verifying the actor's repository write permissions. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.
| CWE | CWE-639 |
| Vendor | github |
| Product | enterprise server |
| Ecosystems | |
| Industries | Technology |
| Published | Mar 10, 2026 |
| Last Updated | Mar 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for github enterprise server
Be the first to know when new unknown vulnerabilities affecting github enterprise server are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
GitHub / Enterprise Server
3.14.0 ≤ 3.14.23 3.15.0 ≤ 3.15.18 3.16.0 ≤ 3.16.14 3.17.0 ≤ 3.17.11 3.18.0 ≤ 3.18.5 3.19.0 ≤ 3.19.2
References
docs.github.com: https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24 docs.github.com: https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19 docs.github.com: https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15 docs.github.com: https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12 docs.github.com: https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6 docs.github.com: https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3
Credits
ahacker1