CVE-2025-48567

Source
https://cve.org/CVERecord?id=CVE-2025-48567
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48567.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-48567
Aliases
Published
2026-03-02T19:16:25.880Z
Modified
2026-03-13T01:32:49.099087Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In multiple locations, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48567.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "14.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "15.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "16.0-NA"
            }
        ]
    }
]