Unrated severityNVD Advisory· Published Mar 10, 2026· Updated Mar 11, 2026
Improper authorization in GitHub Projects allows modification of issue and pull request metadata without repository write access
CVE-2026-3306
Description
An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed a user with read access to a repository and write access to a project to modify issue and pull request metadata through the project. When adding an item to a project that already existed, column value updates were applied without verifying the actor's repository write permissions. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3.
Affected products
2- Range: <3.14.24, <3.15.19, <3.16.15, <3.17.12, <3.18.6, <3.19.3
- GitHub/Enterprise Serverv5Range: 3.14.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- docs.github.com/en/enterprise-server@3.14/admin/release-notesmitre
- docs.github.com/en/enterprise-server@3.15/admin/release-notesmitre
- docs.github.com/en/enterprise-server@3.16/admin/release-notesmitre
- docs.github.com/en/enterprise-server@3.17/admin/release-notesmitre
- docs.github.com/en/enterprise-server@3.18/admin/release-notesmitre
- docs.github.com/en/enterprise-server@3.19/admin/release-notesmitre
News mentions
0No linked articles in our index yet.