All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3502-1 | python-git security update |
Debian DLA |
DLA-3939-1 | python-git security update |
Github GHSA |
GHSA-hcpj-qp55-gfph | GitPython vulnerable to Remote Code Execution due to improper user input validation |
Ubuntu USN |
USN-5968-1 | GitPython vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-11-03T21:46:05.215Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-24439
No data.
Status : Modified
Published: 2022-12-06T05:15:11.420
Modified: 2025-11-03T22:15:57.110
Link: CVE-2022-24439
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN