Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization.
This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9w5j-4mwv-2wj8 | Remote code execution in simple-git |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 01 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-04-01T15:29:18.377Z
Reserved: 2022-02-24T11:58:25.171Z
Link: CVE-2022-25860
Updated: 2024-08-03T04:49:44.156Z
Status : Modified
Published: 2023-01-26T21:15:31.073
Modified: 2025-04-01T16:15:15.807
Link: CVE-2022-25860
No data.
OpenCVE Enrichment
No data.
Github GHSA