Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-19118 | Registrator is a GitHub app that automates creation of registration pull requests for julia packages to the General registry. Prior to version 1.9.5, if the clone URL returned by GitHub is malicious (or can be injected using upstream vulnerabilities) a shell script injection can occur within the `withpasswd` function. Alternatively, an argument injection is possible in the `gettreesha `function. either of these can then lead to a potential RCE. Users should upgrade immediately to v1.9.5 to receive a fix. All prior versions are vulnerable. No known workarounds are available. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Julialang
Julialang registrator |
|
CPEs | cpe:2.3:a:julialang:registrator:*:*:*:*:*:julia:*:* | |
Vendors & Products |
Julialang
Julialang registrator |
|
Metrics |
cvssV3_1
|
Thu, 26 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Jun 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Registrator is a GitHub app that automates creation of registration pull requests for julia packages to the General registry. Prior to version 1.9.5, if the clone URL returned by GitHub is malicious (or can be injected using upstream vulnerabilities) a shell script injection can occur within the `withpasswd` function. Alternatively, an argument injection is possible in the `gettreesha `function. either of these can then lead to a potential RCE. Users should upgrade immediately to v1.9.5 to receive a fix. All prior versions are vulnerable. No known workarounds are available. | |
Title | Registrator.jl Vulnerable to Argument Injection and Command Injection | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-26T14:38:03.142Z
Reserved: 2025-06-17T02:28:39.718Z
Link: CVE-2025-52483

Updated: 2025-06-26T14:37:41.493Z

Status : Analyzed
Published: 2025-06-25T17:15:38.740
Modified: 2025-09-19T16:01:28.570
Link: CVE-2025-52483

No data.

No data.