CVE-2026-3854: Critical GitHub Flaw Enables Remote Execution with a Single Push

Published on April 29, 2026 | Translated from Spanish

Cybersecurity researchers have revealed the details of CVE-2026-3854, a critical vulnerability with a CVSS score of 8.7 affecting GitHub.com and GitHub Enterprise Server. This command injection flaw allows an authenticated user with write access to a repository to execute remote code with a single git push command, achieving unauthorized control over the affected server.

A hacker types a malicious push into a GitHub repository, with a terminal showing injected code and a server burning in red.

Technical details of the server command injection 🔥

The vulnerability lies in the handling of references during the push operation. When the attacker sends malicious changes, the server does not properly validate user input before processing the command. This allows arbitrary operating system commands to be injected. Exploitation requires authentication and write permissions, but once the server is compromised, the attacker can escalate privileges, access sensitive data, or deploy additional payloads.

The push that changes everything (literally) 😈

Finally, a way to make a git push truly exciting. Forget about resolving merge conflicts or waiting for CI tests to pass. Now, with a single command, you can turn your repository into a backdoor for the GitHub server. The best part is you don't need to be a terminal ninja: just a user with write permissions and a willingness to experiment. At least, when the system administrator calls you, you'll have a creative excuse.