CVE-2026-6736
Severity CVSS v4.0:
MEDIUM
Type:
CWE-306
Missing Authentication for Critical Function
Publication date:
07/05/2026
Last modified:
11/05/2026
Description
An authentication bypass vulnerability was identified in GitHub Enterprise Server that allowed an unauthenticated attacker to create a local user account, bypassing the configured external identity provider. When external authentication was enabled, the signup endpoint did not properly enforce the authentication restriction, allowing account creation and session establishment without identity provider validation. The created account was limited to the default base permissions configured on the instance. Exploitation required network access to a GHES instance configured with an external authentication provider. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.21 and was fixed in versions 3.20.2, 3.19.6, 3.18.9, 3.17.15, and 3.16.18.
Impact
Base Score 4.0
6.30
Severity 4.0
MEDIUM
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | 3.16.18 (excluding) | |
| cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | 3.17.0 (including) | 3.17.15 (excluding) |
| cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | 3.18.0 (including) | 3.18.9 (excluding) |
| cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | 3.19.0 (including) | 3.19.6 (excluding) |
| cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | 3.20.0 (including) | 3.20.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.18
- https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.15
- https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.9
- https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.6
- https://docs.github.com/en/enterprise-server@3.20/admin/release-notes#3.20.2



