CVE-2026-0573

9.0 CRITICAL

📋 TL;DR

An authenticated attacker on GitHub Enterprise Server could exploit an insecure URL redirect in the repository_pages API to leak privileged JWT tokens. This could lead to remote code execution by using the stolen Actions.ManageOrgs token. All GitHub Enterprise Server instances prior to patched versions are affected.

💻 Affected Systems

Products:
  • GitHub Enterprise Server
Versions: All versions prior to 3.19, specifically fixed in 3.19.2, 3.18.4, 3.17.10, 3.16.13, 3.15.17, and 3.14.22
Operating Systems: All supported platforms for GitHub Enterprise Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have authenticated access to the target instance and ability to exploit legacy redirects.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on the GitHub Enterprise Server instance, potentially compromising the entire platform and all hosted repositories.

🟠

Likely Case

Unauthorized access to organization management functions, repository manipulation, or data exfiltration using stolen tokens.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though token leakage still represents a significant credential exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and control over a domain that can receive redirected requests with authorization headers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.19.2, 3.18.4, 3.17.10, 3.16.13, 3.15.17, or 3.14.22 depending on current version

Vendor Advisory: https://docs.github.com/en/enterprise-server/admin/release-notes

Restart Required: Yes

Instructions:

1. Backup your GitHub Enterprise Server instance. 2. Download the appropriate patch version from GitHub Enterprise releases. 3. Follow the upgrade instructions for your deployment method (VM, AWS, Azure, etc.). 4. Restart the instance after upgrade completes.

🔧 Temporary Workarounds

Network restriction for outbound API calls

all

Restrict outbound HTTP requests from GitHub Enterprise Server to only trusted domains to prevent token exfiltration.

Monitor for suspicious redirects

all

Implement logging and monitoring for repository_pages API calls with external redirects.

🧯 If You Can't Patch

  • Implement strict network egress filtering to prevent GitHub Enterprise Server from making outbound HTTP requests to untrusted domains.
  • Monitor authentication logs for unusual token usage patterns and implement alerting for Actions.ManageOrgs JWT usage.

🔍 How to Verify

Check if Vulnerable:

Check your GitHub Enterprise Server version via the Management Console or SSH into the appliance and run 'ghe-version'.

Check Version:

ghe-version

Verify Fix Applied:

Verify version is 3.19.2 or higher, or one of the specific patched versions for older releases (3.18.4, 3.17.10, etc.).

📡 Detection & Monitoring

Log Indicators:

  • Unusual repository_pages API calls with external redirects
  • Authentication attempts using Actions.ManageOrgs tokens from unexpected sources

Network Indicators:

  • Outbound HTTP requests from GitHub Enterprise Server to unknown domains with authorization headers

SIEM Query:

source="github-enterprise" AND (url_redirect OR repository_pages) AND external_domain

🔗 References

📤 Share & Export