Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization.
This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9w5j-4mwv-2wj8 Remote code execution in simple-git
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 01 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2025-04-01T15:29:18.377Z

Reserved: 2022-02-24T11:58:25.171Z

Link: CVE-2022-25860

cve-icon Vulnrichment

Updated: 2024-08-03T04:49:44.156Z

cve-icon NVD

Status : Modified

Published: 2023-01-26T21:15:31.073

Modified: 2025-04-01T16:15:15.807

Link: CVE-2022-25860

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.