CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Lifecycle Timeline
4Description
Git GUI allows you to use the Git source control management tools via a GUI. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. Due to the unfortunate design of Tcl on Windows, the search path when looking for an executable always includes the current directory. The mentioned programs are invoked when the user selects Git Bash or Browse Files from the menu. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
Analysis
A remote code execution vulnerability in Git GUI (CVSS 8.6) that allows you. High severity vulnerability requiring prompt remediation.
Technical Context
CWE-78 (OS Command Injection). CVSS 8.6 indicates high severity. Affects Git GUI.
Affected Products
['Git GUI']
Remediation
Monitor vendor channels for patch availability. Implement input validation and WAF rules as interim mitigation.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| xenial | not-affected | Windows only |
| bionic | not-affected | Windows only |
| focal | not-affected | Windows only |
| jammy | not-affected | Windows only |
| noble | not-affected | Windows only |
| oracular | not-affected | Windows only |
| plucky | not-affected | Windows only |
| upstream | pending | 2.43.7 |
Debian
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | fixed | 1:2.30.2-1+deb11u2 | - |
| bullseye (security) | fixed | 1:2.30.2-1+deb11u5 | - |
| bookworm | fixed | 1:2.39.5-0+deb12u3 | - |
| bookworm (security) | fixed | 1:2.39.5-0+deb12u2 | - |
| trixie | fixed | 1:2.47.3-0+deb13u1 | - |
| forky | fixed | 1:2.51.0-1 | - |
| sid | fixed | 1:2.53.0-1 | - |
| (unstable) | not-affected | - | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21003