TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

GitHub Blog

Securing the git push pipeline: Responding to a critical remote code execution vulnerability

Alexis Wales · 2026-04-28 · Read original ↗

ATT&CK techniques detected

3 predictions
T1190Exploit Public-Facing Application
58%
“##in hook execution, and ultimately execute arbitrary commands on the server. responding to the vulnerability with the root cause identified on march, 4, 2026, at 5 : 45 p. m. utc, our engineering team developed and deployed a fix to github. com at 7 : 00 p. m. utc that same day.…”
T1195.002Compromise Software Supply Chain
52%
“securing the git push pipeline : responding to a critical remote code execution vulnerability on march 4, 2026, we received a vulnerability report through our bug bounty program from researchers at wiz describing a critical remote code execution vulnerability affecting github. co…”
T1190Exploit Public-Facing Application
45%
“github enterprise server 3. 14. 25 or later github enterprise server 3. 15. 20 or later github enterprise server 3. 16. 16 or later github enterprise server 3. 17. 13 or later github enterprise server 3. 18. 7 or later github enterprise server 3. 19. 4 or later github enterprise …”

Summary

How we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation.

The post Securing the git push pipeline: Responding to a critical remote code execution vulnerability appeared first on The GitHub Blog.