An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed a user with read access to a repository and write access to a project to modify issue and pull request metadata through the project. When adding an item to a project that already existed, column value updates were applied without verifying the actor's repository write permissions. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.
History

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed a user with read access to a repository and write access to a project to modify issue and pull request metadata through the project. When adding an item to a project that already existed, column value updates were applied without verifying the actor's repository write permissions. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.
Title Improper authorization in GitHub Projects allows modification of issue and pull request metadata without repository write access
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_P

Published:

Updated: 2026-03-10T17:46:57.090Z

Reserved: 2026-02-26T21:00:40.345Z

Link: CVE-2026-3306

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-10T18:19:01.137

Modified: 2026-03-10T18:19:01.137

Link: CVE-2026-3306

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.