CVE-2026-6736
Published: Thu, 07 May 2026 22:16
Summary
An authentication bypass vulnerability was identified in GitHub Enterprise Server that allowed an unauthenticated attacker to create a local user account, bypassing the configured external identity pr
Details
An authentication bypass vulnerability was identified in GitHub Enterprise Server that allowed an unauthenticated attacker to create a local user account, bypassing the configured external identity provider. When external authentication was enabled, the signup endpoint did not properly enforce the authentication restriction, allowing account creation and session establishment without identity provider validation. The created account was limited to the default base permissions configured on the instance. Exploitation required network access to a GHES instance configured with an external authentication provider. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.2, 3.19.6, 3.18.9, 3.17.15, and 3.16.18.
Are YOU affected by CVE-2026-6736?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-6736 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.18
- https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.15
- https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.9
- https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.6
- https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.2
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.