Changeflow GovPing Data Privacy & Cybersecurity Microsoft GitHub Enterprise Server: Multiple Vu...
Priority review Guidance Added Final

Microsoft GitHub Enterprise Server: Multiple Vulnerabilities, CVSS 8.9 (High)

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued a security advisory warning of multiple vulnerabilities in Microsoft GitHub Enterprise Server affecting versions prior to 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, and 3.15.21. The vulnerabilities carry a CVSS Base Score of 8.9 (High) and a CVSS Temporal Score of 7.7 (High), with remote attack capability confirmed. An attacker could exploit these flaws to bypass security controls, execute arbitrary code, and disclose information. Mitigation measures are available and organisations running affected versions should apply patches promptly.

“Ein Angreifer kann mehrere Schwachstellen in Microsoft GitHub Enterprise ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um beliebigen Programmcode auszuführen, und um Informationen offenzulegen.”

Why this matters

Organizations running self-hosted GitHub Enterprise Server instances should immediately inventory all deployments and verify versions against the affected version list. With remote attack confirmed and arbitrary code execution possible, unpatched instances may serve as entry points for supply chain attacks on software development pipelines. Security teams should review access controls and monitor for indicators of compromise pending patch deployment.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors CERT-Bund Security Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 368 changes logged to date.

What changed

CERT-Bund published a high-severity security advisory detailing multiple vulnerabilities in Microsoft GitHub Enterprise Server. Six version branches are affected: prior to 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, and 3.15.21. The vulnerabilities are scored CVSS Base 8.9 / Temporal 7.7, both High, and remote exploitation is confirmed.

Organisations running any affected GitHub Enterprise Server version should prioritise applying available mitigations or patches. Failure to remediate exposes systems to security-bypass, arbitrary-code-execution, and information-disclosure attacks. Security and IT operations teams should inventory their GitHub Enterprise deployments, identify affected versions, and coordinate patching without delay.

What to do next

  1. Update Microsoft GitHub Enterprise Server to patched versions (3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, or 3.15.21 or later)

Archived snapshot

Apr 22, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1231] Microsoft GitHub Enterprise: Mehrere Schwachstellen CVSS Base Score 8.9 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 21.04.2026 Stand 22.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges

Produktbeschreibung

GitHub ist ein netzbasierter Dienst zur Versionsverwaltung für Software-Entwicklungsprojekte.

Produkte

21.04.2026
- Microsoft GitHub Enterprise Server <3.20.1

  • Microsoft GitHub Enterprise Server <3.19.5

  • Microsoft GitHub Enterprise Server <3.18.8

  • Microsoft GitHub Enterprise Server <3.17.14

  • Microsoft GitHub Enterprise Server <3.16.17

  • Microsoft GitHub Enterprise Server <3.15.21

  • Microsoft GitHub Enterprise Server <3.14.26

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Microsoft GitHub Enterprise ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um beliebigen Programmcode auszuführen, und um Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Parties

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 21st, 2026
Instrument
Guidance
Branch
Executive
Source language
de
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies Software manufacturers
Industry sector
5112 Software & Technology
Activity scope
Vulnerability disclosure Server patching
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Artificial Intelligence

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!