Description
go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not properly verified. This resulted in go-git potentially consuming corrupted files, which would likely result in unexpected errors such as object not found. For context, clients fetch packfiles from upstream Git servers. Those files contain a checksum of their contents, so that clients can perform integrity checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when new .pack files are received and processed. The integrity checks for both files were not being verified correctly. This vulnerability is fixed in 5.16.5.
Published: 2026-02-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Integrity Violation
Action: Update
AI Analysis

Impact

Unauthorized manipulation of .pack and .idx files can leave a git repository in an inconsistent state, causing subsequent repository operations to fail with errors such as "object not found". The vulnerability stems from improper verification of checksum values, meaning that corrupted or malformed pack files could be accepted silently, which may lead to unreliable repository content or operational disruption.

Affected Systems

The flaw affects any project that uses the go-git library versions prior to 5.16.5, regardless of the hosting platform or deployment environment. The library itself, named go-git, is commonly embedded in Go applications that perform git operations or mirror repositories.

Risk and Exploitability

With a CVSS score of 4.3 and an EPSS probability below 1%, the likelihood of exploitation is low and the flaw is not listed in the CISA KEV catalog. The attack vector is limited to scenarios where corrupted pack or index files are introduced into a repository that the application ingests; no remote code execution or critical confidentiality breach is possible. The risk, however, manifests as application errors that could negatively impact availability or data integrity for users of the affected library.

Generated by OpenCVE AI on April 17, 2026 at 21:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the go-git library to version 5.16.5 or later, ensuring all dependencies lock to the fixed release.
  • If updating is not immediately possible, recompute repository pack indices locally using the updated go-git tool to enforce proper checksum validation before consuming external packs.
  • Validate repository integrity during CI/CD pipelines by comparing published .pack and .idx checksums against those computed by an updated go-git version to detect potential corruption early.

Generated by OpenCVE AI on April 17, 2026 at 21:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-37cx-329c-33x3 go-git improperly verifies data integrity values for .idx and .pack files
History

Fri, 20 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Go-git Project
Go-git Project go-git
CPEs cpe:2.3:a:go-git_project:go-git:*:*:*:*:*:go:*:*
Vendors & Products Go-git Project
Go-git Project go-git

Thu, 12 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Go-git
Go-git go-git
Vendors & Products Go-git
Go-git go-git

Mon, 09 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Description go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not properly verified. This resulted in go-git potentially consuming corrupted files, which would likely result in unexpected errors such as object not found. For context, clients fetch packfiles from upstream Git servers. Those files contain a checksum of their contents, so that clients can perform integrity checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when new .pack files are received and processed. The integrity checks for both files were not being verified correctly. This vulnerability is fixed in 5.16.5.
Title go-git improperly verifies data integrity values for .idx and .pack files
Weaknesses CWE-354
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Go-git Go-git
Go-git Project Go-git
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-11T21:23:14.781Z

Reserved: 2026-02-09T16:22:17.786Z

Link: CVE-2026-25934

cve-icon Vulnrichment

Updated: 2026-02-11T21:23:12.504Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T23:16:05.937

Modified: 2026-02-20T20:21:19.260

Link: CVE-2026-25934

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-09T22:13:41Z

Links: CVE-2026-25934 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:15:27Z

Weaknesses