Description
Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization.
This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9w5j-4mwv-2wj8 | Remote code execution in simple-git |
References
History
Tue, 01 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-04-01T15:29:18.377Z
Reserved: 2022-02-24T11:58:25.171Z
Link: CVE-2022-25860
Updated: 2024-08-03T04:49:44.156Z
Status : Modified
Published: 2023-01-26T21:15:31.073
Modified: 2025-04-01T16:15:15.807
Link: CVE-2022-25860
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA