CVE-2026-5512 PUBLISHED

Improper authorization vulnerability in GitHub Enterprise Server allowed disclosure of private repository names via mobile upload policy API

Assigner: GitHub_P
Reserved: 03.04.2026 Published: 21.04.2026 Updated: 21.04.2026

An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated attacker to determine the names of private repositories by their numeric ID. The mobile upload policy API endpoint did not perform an early authorization check, and validation error messages included the full repository name for repositories the caller did not have access to. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21, and 3.14.26. This vulnerability was reported via the GitHub Bug Bounty program.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N
CVSS Score: 5.3

Product Status

Vendor GitHub
Product Enterprise Server
Versions Default: affected
  • affected from 3.14.0 to 3.14.25 (incl.)
  • affected from 3.15.0 to 3.15.20 (incl.)
  • affected from 3.16.0 to 3.16.16 (incl.)
  • affected from 3.17.0 to 3.17.13 (incl.)
  • affected from 3.18.0 to 3.18.7 (incl.)
  • affected from 3.19.0 to 3.19.4 (incl.)
  • affected from 3.20.0 to 3.20.1 (excl.)

Credits

  • ahacker1 finder

References

Problem Types

  • CWE-201 Insertion of sensitive information into sent data CWE

Impacts

  • CAPEC-113 Interface Manipulation