Back
Wiz ResearchSecurityWiz Research2026-04-29

A Single Git Push Could Own GitHub's Servers — CVE-2026-3854 Explained

Wiz Research disclosed CVE-2026-3854, a CVSS 8.7 RCE vulnerability in GitHub's infrastructure letting any authenticated user execute arbitrary code on GitHub's servers with a single git push. GitHub patched github.com in 6 hours — but 88% of Enterprise Server instances remain unpatched after public disclosure on April 28.

Original source

Wiz Research has disclosed one of the most serious vulnerabilities ever found in GitHub's infrastructure. CVE-2026-3854, rated CVSS 8.7, is a remote code execution flaw that allowed any authenticated GitHub user to run arbitrary commands on GitHub's backend servers with nothing more than a standard git push command.

## How It Worked

The vulnerability lived in `babeld`, GitHub's internal git proxy service. When users push to a repository, git push options are passed along and embedded into an internal `X-Stat` header that babeld uses for routing. Critically, babeld copied these values verbatim — including unsanitized semicolons — into the header. Since semicolons are field delimiters, an attacker could inject new fields.

The exploit chain strung together three injections: overriding `rails_env` to bypass the sandbox, hijacking `custom_hooks_dir` to redirect where hook scripts are loaded from, and injecting a crafted `repo_pre_receive_hooks` entry that triggered arbitrary command execution as the git service user. Full filesystem read/write access to shared infrastructure followed.

## Timeline and Impact

Wiz reported the vulnerability on March 4, 2026. GitHub validated and patched github.com in under 6 hours — an impressive response. A forensic investigation confirmed no exploitation had occurred before the fix. CVE-2026-3854 was assigned March 10. Public disclosure came on April 28, 2026.

The bad news: at the time of disclosure, **88% of GitHub Enterprise Server instances were still running vulnerable versions**. GHES administrators need to upgrade to version 3.19.3 or later immediately.

## What It Means for the Industry

This vulnerability is a case study in supply chain risk in developer infrastructure. Millions of repositories — including many that power AI systems — were accessible to a single crafted push. GitHub's rapid response deserves credit, but the 88% unpatched GHES rate is a sobering reminder of how slowly on-premise software gets updated even when the stakes are existential.

Panel Takes

The Builder

The Builder

Developer Perspective

GitHub's 6-hour patch on github.com is genuinely impressive incident response. The scary number is the 88% of Enterprise Server instances still unpatched after disclosure — if you're running GHES, drop what you're doing and upgrade to 3.19.3 right now.

The Skeptic

The Skeptic

Reality Check

The real problem isn't the vulnerability itself — it's that critical infrastructure like babeld was handling user inputs without basic sanitization. This class of injection bug should be caught by security reviews, not by external researchers. How long had this been exploitable?

The Futurist

The Futurist

Big Picture

As AI development tools increasingly depend on GitHub — for training data, for CI/CD, for agent-driven commits — the attack surface of GitHub's infrastructure becomes existential. This won't be the last critical finding in the git push pipeline.

Bookmarks

Loading bookmarks...

No bookmarks yet

Bookmark tools to save them for later