CVE-2026-3306

medium

Description

An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed a user with read access to a repository and write access to a project to modify issue and pull request metadata through the project. When adding an item to a project that already existed, column value updates were applied without verifying the actor's repository write permissions. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.

References

https://docs.github.com/en/[email protected]/admin/release-notes#3.19.3

https://docs.github.com/en/[email protected]/admin/release-notes#3.18.6

https://docs.github.com/en/[email protected]/admin/release-notes#3.17.12

https://docs.github.com/en/[email protected]/admin/release-notes#3.16.15

https://docs.github.com/en/[email protected]/admin/release-notes#3.15.19

https://docs.github.com/en/[email protected]/admin/release-notes#3.14.24

Details

Source: Mitre, NVD

Published: 2026-03-10

Updated: 2026-03-12

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 4.3

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Severity: Medium

CVSS v4

Base Score: 5.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00035