CVE-2025-21613

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21613
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21613.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-21613
Aliases
Downstream
Related
Published
2025-01-06T16:13:10Z
Modified
2025-10-15T20:26:50.884904Z
Severity
  • 9.2 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Clear CVSS Calculator
Summary
go-git has an Argument Injection via the URL field
Details

go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.

References

Affected packages

Git / github.com/go-git/go-git

Affected ranges

Type
GIT
Repo
https://github.com/go-git/go-git
Events

Affected versions

v4.*

v4.0.0
v4.1.0
v4.1.1
v4.10.0
v4.11.0
v4.12.0
v4.13.0
v4.13.1
v4.2.0
v4.2.1
v4.3.0
v4.3.1
v4.4.0
v4.4.1
v4.5.0
v4.6.0
v4.7.0
v4.7.1
v4.8.0
v4.8.1
v4.9.0
v4.9.1

v5.*

v5.0.0
v5.1.0
v5.10.0
v5.10.1
v5.11.0
v5.12.0
v5.2.0
v5.3.0
v5.4.0
v5.4.1
v5.4.2
v5.5.0
v5.5.1
v5.5.2
v5.6.0
v5.6.1
v5.7.0
v5.8.0
v5.8.1
v5.9.0