Microsoft GitHub Enterprise Server: Multiple Vulnerabilities, CVSS 8.9 (High)
Summary
CERT-Bund issued a security advisory warning of multiple vulnerabilities in Microsoft GitHub Enterprise Server affecting versions prior to 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, and 3.15.21. The vulnerabilities carry a CVSS Base Score of 8.9 (High) and a CVSS Temporal Score of 7.7 (High), with remote attack capability confirmed. An attacker could exploit these flaws to bypass security controls, execute arbitrary code, and disclose information. Mitigation measures are available and organisations running affected versions should apply patches promptly.
“Ein Angreifer kann mehrere Schwachstellen in Microsoft GitHub Enterprise ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um beliebigen Programmcode auszuführen, und um Informationen offenzulegen.”
Organizations running self-hosted GitHub Enterprise Server instances should immediately inventory all deployments and verify versions against the affected version list. With remote attack confirmed and arbitrary code execution possible, unpatched instances may serve as entry points for supply chain attacks on software development pipelines. Security teams should review access controls and monitor for indicators of compromise pending patch deployment.
About this source
GovPing monitors CERT-Bund Security Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 368 changes logged to date.
What changed
CERT-Bund published a high-severity security advisory detailing multiple vulnerabilities in Microsoft GitHub Enterprise Server. Six version branches are affected: prior to 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, and 3.15.21. The vulnerabilities are scored CVSS Base 8.9 / Temporal 7.7, both High, and remote exploitation is confirmed.
Organisations running any affected GitHub Enterprise Server version should prioritise applying available mitigations or patches. Failure to remediate exposes systems to security-bypass, arbitrary-code-execution, and information-disclosure attacks. Security and IT operations teams should inventory their GitHub Enterprise deployments, identify affected versions, and coordinate patching without delay.
What to do next
- Update Microsoft GitHub Enterprise Server to patched versions (3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, or 3.15.21 or later)
Archived snapshot
Apr 22, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1231] Microsoft GitHub Enterprise: Mehrere Schwachstellen CVSS Base Score 8.9 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 21.04.2026 Stand 22.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
Produktbeschreibung
GitHub ist ein netzbasierter Dienst zur Versionsverwaltung für Software-Entwicklungsprojekte.
Produkte
21.04.2026
- Microsoft GitHub Enterprise Server <3.20.1
Microsoft GitHub Enterprise Server <3.19.5
Microsoft GitHub Enterprise Server <3.18.8
Microsoft GitHub Enterprise Server <3.17.14
Microsoft GitHub Enterprise Server <3.16.17
Microsoft GitHub Enterprise Server <3.15.21
Microsoft GitHub Enterprise Server <3.14.26
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Microsoft GitHub Enterprise ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um beliebigen Programmcode auszuführen, und um Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Parties
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.