Skip to main content
29.04.2026

GitHub's git push RCE: What GHES Admins Should Do

head-image

GitHub disclosed CVE-2026-3854 on April 28 after a Wiz report showed that crafted git push options could inject internal metadata and reach remote code execution. For teams running GitHub Enterprise Server, this is not a theoretical bug. An authenticated user with push access to any repository may be able to compromise the instance.

What Happened

According to GitHub's incident writeup, user-supplied push option values were copied into internal service headers without proper sanitization. Because those headers use semicolon-delimited fields, an attacker could inject extra values that downstream services treated as trusted metadata.

That opened a path to disable expected protections, switch execution paths, and reach arbitrary command execution during repository processing. GitHub says GitHub.com and Enterprise Cloud were patched quickly and found no evidence of exploitation. The urgent risk now sits with self-hosted GHES fleets that have not yet upgraded.

Why SRE Teams Should Care

This flaw sits in a high-trust path that touches source control, hooks, secrets, and CI workflows. A compromised GHES node can expose:

  • all repositories hosted on the instance
  • internal service credentials and integration secrets
  • CI and deployment workflows connected to GitHub
  • a trusted pivot point into the rest of the engineering environment

In other words, this is not just a developer platform issue. It is a control-plane issue for delivery infrastructure.

Immediate Response Steps

Start with patching. GitHub recommends moving to the latest patched release in your supported train, including 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 or later, 3.19.4 or later, or 3.20.0 and newer.

Then review audit logs for suspicious push options. GitHub specifically recommends checking /var/log/github-audit.log for push operations containing semicolons in push option values.

grep -n ';' /var/log/github-audit.log
ghes-config-apply --version

If you suspect exposure, rotate credentials tied to the instance, especially webhook secrets, GitHub Apps, CI runner tokens, package registry tokens, and any cloud credentials stored in actions or integrations.

Operational Tips

Treat this as a short incident-response drill:

  • patch GHES before routine feature work
  • reduce unnecessary push access on stale repositories
  • review custom hook usage and remove anything no longer required
  • verify backups and recovery steps before maintenance starts
  • document who owns GHES patching, logging, and secret rotation

If you operate multiple GHES instances, inventory versions first and patch the most exposed systems, such as internet-facing or contractor-accessible environments, ahead of internal-only nodes.

Conclusion

CVE-2026-3854 is a sharp reminder that developer infrastructure belongs in the same risk tier as Kubernetes control planes and production CI systems. If you run GHES, patch now, review audit logs, and rotate the secrets that matter most.

If you want incident workflows and infrastructure response to move faster, Akmatori helps SRE teams automate operations with AI agents. For the cloud and edge layer behind modern platforms, Gcore provides the infrastructure to run reliably at scale.

Automate incident response and prevent on-call burnout with AI-driven agents!