Description
Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.
Published: 2026-04-25
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a residual flaw from a prior command injection issue where the -c option for passing Git configuration was blocked but the equivalent --config option was not. Due to an incomplete patch for CVE-2022-25912, any untrusted input that reaches the options parameter of simple-git can be used to inject shell commands. An attacker can craft a --config entry that sets protocol.ext.allow=always and provides an ext:: clone source, causing underlying shell code to execute with the privileges of the running Node.js process. The weakness is a code injection flaw as classified by CWE-94 and CWE-88.

Affected Systems

The affected product is the npm package simple-git. Every installation that uses a version earlier than 3.36.0 is potentially vulnerable, regardless of the surrounding application, because the insecure handling occurs inside the library itself. Scripts or services that expose simple-git to user supplied options are at highest risk.

Risk and Exploitability

The CVSS score of 9.2 designates this flaw as critical, while the EPSS score of less than 1% suggests a presently low but non-zero exploitation likelihood. The absence of the vulnerability from CISA’s KEV catalog does not diminish the risk, as exploitation would rely on crafting tailored --config options that enable protocol.ext.allow and reference an ext:: source. An attacker with access to the options argument can achieve full remote code execution on the target system.

Generated by OpenCVE AI on May 6, 2026 at 01:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade simple‑git to version 3.36.0 or newer.
  • Validate or sanitize all data that is passed as options to simple‑git, ensuring no untrusted content is included.
  • Restrict protocol.ext.allow to safe values and avoid using ext:: clone sources when possible.

Generated by OpenCVE AI on May 6, 2026 at 01:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hffm-xvc3-vprc simple-git is vulnerable to Remote Code Execution
History

Wed, 06 May 2026 00:15:00 +0000

Type Values Removed Values Added
Title Residual Command Injection via Incomplete Sanitization of --config in simple‑git Pre‑3.36.0 simple-git: simple-git: Remote Code Execution due to incomplete fix bypass
Weaknesses CWE-88
References
Metrics threat_severity

None

threat_severity

Important


Tue, 28 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Residual Command Injection via Incomplete Sanitization of --config in simple‑git Pre‑3.36.0

Mon, 27 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Steveukx
Steveukx simple-git
Vendors & Products Steveukx
Steveukx simple-git

Sat, 25 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 25 Apr 2026 05:30:00 +0000

Type Values Removed Values Added
Description Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P'}

cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Steveukx Simple-git
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2026-04-25T10:50:22.342Z

Reserved: 2026-04-24T07:25:39.128Z

Link: CVE-2026-6951

cve-icon Vulnrichment

Updated: 2026-04-25T10:49:36.870Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-25T06:16:16.453

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6951

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-25T05:00:05Z

Links: CVE-2026-6951 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T01:30:15Z

Weaknesses