T
traeai
登录
返回首页
The GitHub Blog

Securing the git push pipeline: Responding to a critical remote code execution vulnerability

9.0Score
Securing the git push pipeline: Responding to a critical remote code execution vulnerability
AI 深度提炼
  • 分析了 git push 管道中的远程代码执行漏洞成因。
  • 提出了针对该漏洞的具体缓解和防护策略。
  • 强调了安全开发和部署流程的重要性。
#Git#安全#GitHub
打开原文

Securing the git push pipeline: Responding to a critical remote code execution vulnerability - The GitHub Blog

Skip to contentSkip to sidebar

[](https://github.com/)/Blog

Try GitHub CopilotSee what's new

Learn about artificial intelligence and machine learning across the GitHub ecosystem and the wider industry.

Learn how to build with generative AI.

Change how you work with GitHub Copilot.

Everything developers need to know about LLMs.

Machine learning tips, tricks, and best practices.

Explore the capabilities and benefits of AI code generation and how it can improve your developer experience.

Learn more

Resources for developers to grow in their skills and careers.

Insights and best practices for building apps.

Tips & tricks to grow as a professional developer.

Improve how you use GitHub at work.

Learn how to move into your first professional role.

Stay current on what’s new (or new again).

Learn how to start building, shipping, and maintaining software with GitHub.

Learn more

Get an inside look at how we’re building the home for all developers.

Discover how we deliver a performant and highly available experience across the GitHub platform.

Explore best practices for building software at scale with a majority remote team.

Get a glimpse at the technology underlying the world’s leading AI-powered developer platform.

Learn how we build security into everything we do across the developer lifecycle.

Find out what goes into making GitHub the home for all developers.

Our engineering and security teams do some incredible work. Let’s take a look at how we use GitHub to be more productive, build collaboratively, and shift security left.

Learn more

Explore how to write, build, and deploy enterprise software at scale.

Automating your way to faster and more secure ships.

Guides on continuous integration and delivery.

Tips, tools, and tricks to improve developer collaboration.

DevOps resources for enterprise engineering teams.

How to integrate security into the SDLC.

Ensuring your builds stay clean.

Learn why Gartner positioned GitHub as a Leader for the second year in a row.

Learn more

Keep up with what’s new and notable from inside GitHub.

An inside look at news and product updates from GitHub.

The latest on GitHub’s platform, products, and tools.

Insights into the state of open source on GitHub.

The latest policy and regulatory changes in software.

Data-driven insights around the developer ecosystem.

Older news and updates from GitHub.

Learn how to use retrieval-augmented generation (RAG) to capture more insights.

Learn more

Everything open source on GitHub.

The latest Git updates.

Spotlighting open source maintainers.

How open source is driving positive change.

Explore open source games on GitHub.

Organizations worldwide are incorporating open source methodologies into the way they build and ship their own software.

Learn more

Stay up to date on everything security.

Application security, explained.

Demystifying supply chain security.

Updates from the GitHub Security Lab.

Helpful tips on securing web applications.

Learn about core challenges in DevSecOps, and how you can start addressing them with AI and automation.

Learn more

Search

Categories

Learn about artificial intelligence and machine learning across the GitHub ecosystem and the wider industry.

Learn how to build with generative AI.

Change how you work with GitHub Copilot.

Everything developers need to know about LLMs.

Machine learning tips, tricks, and best practices.

Explore the capabilities and benefits of AI code generation and how it can improve your developer experience.

Learn more

Resources for developers to grow in their skills and careers.

Insights and best practices for building apps.

Tips & tricks to grow as a professional developer.

Improve how you use GitHub at work.

Learn how to move into your first professional role.

Stay current on what’s new (or new again).

Learn how to start building, shipping, and maintaining software with GitHub.

Learn more

Get an inside look at how we’re building the home for all developers.

Discover how we deliver a performant and highly available experience across the GitHub platform.

Explore best practices for building software at scale with a majority remote team.

Get a glimpse at the technology underlying the world’s leading AI-powered developer platform.

Learn how we build security into everything we do across the developer lifecycle.

Find out what goes into making GitHub the home for all developers.

Our engineering and security teams do some incredible work. Let’s take a look at how we use GitHub to be more productive, build collaboratively, and shift security left.

Learn more

Explore how to write, build, and deploy enterprise software at scale.

Automating your way to faster and more secure ships.

Guides on continuous integration and delivery.

Tips, tools, and tricks to improve developer collaboration.

DevOps resources for enterprise engineering teams.

How to integrate security into the SDLC.

Ensuring your builds stay clean.

Learn why Gartner positioned GitHub as a Leader for the second year in a row.

Learn more

Keep up with what’s new and notable from inside GitHub.

An inside look at news and product updates from GitHub.

The latest on GitHub’s platform, products, and tools.

Insights into the state of open source on GitHub.

The latest policy and regulatory changes in software.

Data-driven insights around the developer ecosystem.

Older news and updates from GitHub.

Learn how to use retrieval-augmented generation (RAG) to capture more insights.

Learn more

Everything open source on GitHub.

The latest Git updates.

Spotlighting open source maintainers.

How open source is driving positive change.

Explore open source games on GitHub.

Organizations worldwide are incorporating open source methodologies into the way they build and ship their own software.

Learn more

Stay up to date on everything security.

Application security, explained.

Demystifying supply chain security.

Updates from the GitHub Security Lab.

Helpful tips on securing web applications.

Learn about core challenges in DevSecOps, and how you can start addressing them with AI and automation.

Learn more

See what's newTry GitHub Copilot

Home/Security

Securing the git push pipeline: Responding to a critical remote code execution vulnerability

How we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation.

Image 8: A grid of abstract cubes highlights a central cube displaying a shield with a checkmark to represent security.

[Alexis Wales](https://github.blog/author/alexiswales/ "Posts by Alexis Wales")·@alexiswales

April 28, 2026

| 5 minutes

  • Share:
  • [](https://x.com/share?text=Securing%20the%20git%20push%20pipeline%3A%20Responding%20to%20a%20critical%20remote%20code%20execution%20vulnerability&url=https%3A%2F%2Fgithub.blog%2Fsecurity%2Fsecuring-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability%2F)
  • [](https://www.facebook.com/sharer/sharer.php?t=Securing%20the%20git%20push%20pipeline%3A%20Responding%20to%20a%20critical%20remote%20code%20execution%20vulnerability&u=https%3A%2F%2Fgithub.blog%2Fsecurity%2Fsecuring-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability%2F)
  • [](https://www.linkedin.com/shareArticle?title=Securing%20the%20git%20push%20pipeline%3A%20Responding%20to%20a%20critical%20remote%20code%20execution%20vulnerability&url=https%3A%2F%2Fgithub.blog%2Fsecurity%2Fsecuring-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability%2F)

On March 4, 2026, we received a vulnerability report through our Bug Bounty program from researchers at Wiz describing a critical remote code execution vulnerability affecting github.com, GitHub Enterprise Cloud, GitHub Enterprise Cloud with Data Residency, GitHub Enterprise Cloud with Enterprise Managed Users, and GitHub Enterprise Server.

In less than two hours we had validated the finding, deployed a fix to github.com, and begun a forensic investigation that concluded **there was no exploitation**.

In this post, we want to share what happened, how we responded, and what we are doing to prevent similar issues in the future.

Receiving the bug bounty report

The bug bounty report described a way for any user with push access to a repository, including a repository they created themselves, to achieve arbitrary command execution on the GitHub server handling their `git push` operation. The attack required only a single command: `git push` with a crafted push option that leveraged an unsanitized character.

Our security team immediately began validating the bug bounty report. Within 40 minutes, we had reproduced the vulnerability internally and confirmed the severity. This was a critical issue that required immediate action.

Understanding the vulnerability

When a user pushes code to GitHub, the operation passes through multiple internal services. As part of this process, metadata about the push, such as the repository type and the environment it should be processed in, is passed between services using an internal protocol.

The vulnerability leveraged how user-supplied git push options were handled within this metadata. Push options are an intentional feature of git that allow clients to send key-value strings to the server during a push. However, the values provided by the user were incorporated into the internal metadata without sufficient sanitization. Because the internal metadata format used a delimiter character that could also appear in user input, an attacker could inject additional fields that the downstream service would interpret as trusted internal values.

By chaining several injected values together, the researchers demonstrated that an attacker could override the environment the push was processed in, bypass sandboxing protections that normally constrain hook execution, and ultimately execute arbitrary commands on the server.

Responding to the vulnerability

With the root cause identified on March, 4, 2026, at 5:45 p.m. UTC, our engineering team developed and deployed a fix to github.com at 7:00 p.m. UTC that same day. The fix ensures that user-supplied push option values are properly sanitized and can no longer influence internal metadata fields.

For GitHub Enterprise Server, we prepared patches across all supported releases (3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.8, 3.19.4, 3.20.0, or later) and published CVE-2026-3854. These are available today and we strongly recommend that all GHES customers upgrade immediately.

Investigating for exploitation

With the immediate fix in place on github.com, we moved to the pressing question of whether anyone else found and exploited this vulnerability before the researchers reported it.

A key property of this vulnerability gave us confidence in our ability to answer that question. The exploit forces the server to take a code path that is never used during normal operations on github.com. This is not something an attacker can avoid or suppress, as it is an inherent consequence of how the injection works.

We logged this path and queried our telemetry for any instance of this anomalous code path being executed. The results were clear:

  • Every occurrence mapped to the Wiz researchers’ own testing activity.
  • No other users or accounts triggered this code path.
  • No customer data was accessed, modified, or exfiltrated as a result of this vulnerability.

For GHES customers, exploitation would require an authenticated user with push access on your instance. We recommend reviewing your access logs out of an abundance of caution.

Defense in depth

Beyond fixing the immediate input sanitization issue, our investigation surfaced an additional finding worth sharing.

The exploit worked in part because the server had access to a code path that was not intended for the environment it was running in. This code path existed on disk as part of the server’s container image, even though it was only meant to be used in a different product configuration. An older deployment method had correctly excluded this code, but when the deployment model changed, the exclusion was not carried forward.

This is a useful reminder that defense in depth matters. The input sanitization fix is the primary remediation, but we have also removed the unnecessary code path from environments where it should not exist. Even if a similar injection vulnerability were discovered in the future, this additional hardening would limit what an attacker could do with it.

What you should do

**GitHub Enterprise Cloud**, **GitHub Enterprise Cloud with Enterprise Managed Users**, **GitHub Enterprise Cloud with Data Residency**, and **github.com** were patched on March 4, 2026. No action is required from users of any of these.

As mentioned previously, exploitation on **GitHub Enterprise Server** requires an authenticated user with push access on your instance. We recommend that you review `/var/log/github-audit.log` for push operations containing `;` in push options. Updates are available in the following releases:

  • GitHub Enterprise Server 3.14.25 or later
  • GitHub Enterprise Server 3.15.20 or later
  • GitHub Enterprise Server 3.16.16 or later
  • GitHub Enterprise Server 3.17.13 or later
  • GitHub Enterprise Server 3.18.7 or later
  • GitHub Enterprise Server 3.19.4 or later
  • GitHub Enterprise Server 3.20.0 or later

We strongly recommend upgrading to the latest patch release as soon as possible. See the GHES release notes for details.

This vulnerability has been assigned CVE-2026-3854.

Acknowledgments

This vulnerability was discovered and responsibly disclosed by researchers at Wiz. Their report was thorough, clearly demonstrated the impact, and enabled us to move quickly from validation to remediation. This finding will receive one of the highest rewards in the history of our Bug Bounty program, which has been a cornerstone of our security program for over a decade.

  • * *

Tags:

Written by

Image 9: Alexis Wales

[Alexis Wales](https://github.blog/author/alexiswales/)

@alexiswales

Alexis Wales is the Chief Information Security Officer of GitHub. She leads a team of security experts focused on safeguarding the GitHub platform, products and the open source community, empowering more than 150 million developers worldwide to build and deploy software securely on GitHub.

Alexis has 20 years of experience defending critical national and private sector networks, spanning positions with the Department of Defense and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). This experience sparked her passion for collaboration between the public and private sectors to solve the hardest security challenges that threaten the technology we use every day.

Table of Contents

More on [CVE](https://github.blog/tag/cve/)

[A year of open source vulnerability trends: CVEs, advisories, and malware](https://github.blog/security/supply-chain-security/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware/)

Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew—here’s what changed and what it means for your triage and response.

[Jonathan Evans](https://github.blog/author/jonathanlevans/ "Posts by Jonathan Evans")

[How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework](https://github.blog/security/how-to-scan-for-vulnerabilities-with-github-security-labs-open-source-ai-powered-framework/)

GitHub Security Lab Taskflow Agent is very effective at finding Auth Bypasses, IDORs, Token Leaks, and other high-impact vulnerabilities.

[Man Yue Mo](https://github.blog/author/mymo/ "Posts by Man Yue Mo")&[Peter Stöckli](https://github.blog/author/stockli/ "Posts by Peter Stöckli")

Related posts

Image 10: Copilot moves through a decorative field of floating cubes marked with sync and check icons.

AI & ML

[Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game](https://github.blog/security/hack-the-ai-agent-build-agentic-ai-security-skills-with-the-github-secure-code-game/)

Learn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 developers have already used to sharpen their security skills.

[Joseph Katsioloudes](https://github.blog/author/jkcso/ "Posts by Joseph Katsioloudes")

Image 11: A decorative background featuring a shield with a checkmark symbol suggesting security or verification.

Application security

[How exposed is your code? Find out in minutes—for free](https://github.blog/security/application-security/how-exposed-is-your-code-find-out-in-minutes-for-free/)

The new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost.

[Dorothy Pearce](https://github.blog/author/dorothymitchell/ "Posts by Dorothy Pearce")&[Eric Tooley](https://github.blog/author/2ley/ "Posts by Eric Tooley")

Image 12: A grid of abstract cubes highlights a central cube displaying a shield with a checkmark to represent security.

Security

[Securing the open source supply chain across GitHub](https://github.blog/security/supply-chain-security/securing-the-open-source-supply-chain-across-github/)

Recent attacks on open source focus on exfiltrating secrets; here are the prevention steps you can take today, plus a look at the security capabilities GitHub is working on.

[Zachary Steindler](https://github.blog/author/steiza/ "Posts by Zachary Steindler")

Explore more from GitHub

Image 13: Docs

Docs

Everything you need to master GitHub, all in one place.

Go to Docs

Image 14: GitHub

GitHub

Build what’s next on GitHub, the place for anyone from anywhere to build anything.

Start building

Image 15: Customer stories

Customer stories

Meet the companies and engineering teams that build with GitHub.

Learn more

Image 16: The GitHub Podcast

The GitHub Podcast

Catch up on the GitHub podcast, a show dedicated to the topics, trends, stories and culture in and around the open source developer community on GitHub.

Listen now

We do newsletters, too

Discover tips, technical guides, and best practices in our biweekly newsletter just for devs.

Your email address

*Your email address

Subscribe

  • [x] Yes please, I’d like GitHub and affiliates to use my information for personalized communications, targeted advertising and campaign effectiveness. See the GitHub Privacy Statement for more details.

Subscribe

Site-wide Links

[](https://github.com/)

Product

Platform

Support

Company

  • © 2026 GitHub, Inc.
  • Terms
  • Privacy
  • Manage Cookies
  • Do not share my personal information