Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-1999
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_P
Assigner Org ID-82327ea3-741d-41e4-88f8-2cf9e791e760
View Known Exploited Vulnerability (KEV) details
Published At-18 Feb, 2026 | 20:44
Updated At-19 Feb, 2026 | 14:32
Rejected At-
▼CVE Numbering Authority (CNA)
Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed unauthorized merging of pull requests

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to merge their own pull request into a repository without having push access by exploiting an authorization bypass in the enable_auto_merge mutation for pull requests. This issue only affected repositories that allow forking as the attack relies on opening a pull request from an attacker-controlled fork into the target repository. Exploitation was only possible in specific scenarios. It required a clean pull request status and only applied to branches without branch protection rules enabled. This vulnerability affected GitHub Enterprise Server versions prior to 3.19.2, 3.18.5, and 3.17.11, and was fixed in versions 3.19.2, 3.18.5, and 3.17.11. This vulnerability was reported via the GitHub Bug Bounty program.

Affected Products
Vendor
GitHub, Inc.GitHub
Product
Enterprise Server
Default Status
affected
Versions
Affected
  • From 3.17.0 before 3.17.11 (semver)
    • -> unaffectedfrom3.17.11
  • From 3.18.0 before 3.18.5 (semver)
    • -> unaffectedfrom3.18.5
  • From 3.19.0 before 3.19.2 (semver)
    • -> unaffectedfrom3.19.2
Problem Types
TypeCWE IDDescription
CWECWE-863CWE-863 Incorrect Authorization
Type: CWE
CWE ID: CWE-863
Description: CWE-863 Incorrect Authorization
Metrics
VersionBase scoreBase severityVector
4.07.1HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:L/SC:L/SI:H/SA:N
Version: 4.0
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:L/SC:L/SI:H/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-233CAPEC-233 Privilege Escalation
CAPEC ID: CAPEC-233
Description: CAPEC-233 Privilege Escalation
Solutions

Configurations

Workarounds

Exploits

Credits

finder
ahacker1
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.11
release-notes
https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.5
release-notes
https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.2
release-notes
Hyperlink: https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.11
Resource:
release-notes
Hyperlink: https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.5
Resource:
release-notes
Hyperlink: https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.2
Resource:
release-notes
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found