Git-Scm Git vulnerabilities
41 known vulnerabilities affecting git-scm/git.
Total CVEs
41
CISA KEV
1
actively exploited
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL8HIGH25MEDIUM6LOW2
Vulnerabilities
Page 1 of 3
CVE-2025-48384HIGHCVSS 8.0KEVfixed in 2.43.7≥ 2.44.0, < 2.44.4+6 more2025-07-08
CVE-2025-48384 [HIGH] CWE-59 CVE-2025-48384: Git is a fast, scalable, distributed revision control system with an unusually rich command set that
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost
nvd
CVE-2024-32021HIGHCVSS 7.1fixed in 2.39.4≥ 2.40.0, < 2.40.2+5 more2024-05-14
CVE-2024-32021 [LOW] CVE-2024-32021: Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2,
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over th
nvd
CVE-2024-32004HIGHCVSS 7.8fixed in 2.39.4≥ 2.40.0, < 2.40.2+5 more2024-05-14
CVE-2024-32004 [HIGH] CWE-114 CVE-2024-32004: Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2,
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround
nvd
CVE-2024-32465HIGHCVSS 7.8fixed in 2.39.4≥ 2.40.0, < 2.40.2+5 more2024-05-14
CVE-2024-32465 [HIGH] CVE-2024-32465: Git is a revision control system. The Git project recommends to avoid working in untrusted repositor
Git is a revision control system. The Git project recommends to avoid working in untrusted repositories, and instead to clone it first with `git clone --no-local` to obtain a clean copy. Git has specific protections to make that a safe operation even with an untrusted source repository, but vulnerabilities allow those protections to be bypassed. In the contex
nvd
CVE-2024-32020LOWCVSS 3.3fixed in 2.39.4≥ 2.40.0, < 2.40.2+5 more2024-05-14
CVE-2024-32020 [LOW] CWE-281 CVE-2024-32020: Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2,
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritt
nvd
CVE-2023-29007HIGHCVSS 7.8fixed in 2.30.9≥ 2.31.0, < 2.31.8+9 more2023-04-25
CVE-2023-29007 [HIGH] CWE-74 CVE-2023-29007: Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8,
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to injec
nvd
CVE-2023-25652HIGHCVSS 7.5fixed in 2.30.9≥ 2.31.0, < 2.31.8+9 more2023-04-25
CVE-2023-25652 [HIGH] CWE-22 CVE-2023-25652: Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8,
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A f
nvd
CVE-2023-23946HIGHCVSS 7.5fixed in 2.30.8≥ 2.31.0, < 2.31.7+8 more2023-02-14
CVE-2023-23946 [MEDIUM] CWE-22 CVE-2023-23946: Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.
Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2,
nvd
CVE-2023-22490MEDIUMCVSS 5.5fixed in 2.30.8≥ 2.31.0, < 2.31.7+8 more2023-02-14
CVE-2023-22490 [MEDIUM] CVE-2023-22490: Git is a revision control system. Using a specially-crafted repository, Git prior to versions 2.39.2
Git is a revision control system. Using a specially-crafted repository, Git prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8 can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source `$GIT_DIR/objects` directory contains sy
nvd
CVE-2022-41903CRITICALCVSS 9.8≤ 2.30.6≥ 2.31.0, ≤ 2.31.5+8 more2023-01-17
CVE-2022-41903 [CRITICAL] CWE-190 CVE-2022-41903: Git is distributed revision control system. `git log` can display commits in an arbitrary format usi
Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stor
nvd
CVE-2022-23521CRITICALCVSS 9.8≤ 2.30.6≥ 2.31.0, ≤ 2.31.5+8 more2023-01-17
CVE-2022-23521 [CRITICAL] CWE-190 CVE-2022-23521: Git is distributed revision control system. gitattributes are a mechanism to allow defining attribut
Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple inte
nvd
CVE-2022-41953HIGHCVSS 7.8fixed in 2.39.12023-01-17
CVE-2022-41953 [HIGH] CWE-426 CVE-2022-41953: Git GUI is a convenient graphical tool that comes with Git for Windows. Its target audience is users
Git GUI is a convenient graphical tool that comes with Git for Windows. Its target audience is users who are uncomfortable with using Git on the command-line. Git GUI has a function to clone repositories. Immediately after the local clone is available, Git GUI will automatically post-process it, among other things running a spell checker called `aspel
nvd
CVE-2022-39260HIGHCVSS 8.8fixed in 2.30.6≥ 2.31.0, < 2.31.5+7 more2022-10-19
CVE-2022-39260 [HIGH] CWE-122 CVE-2022-39260: Git is an open source, scalable, distributed revision control system. `git shell` is a restricted lo
Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int`
nvd
CVE-2022-39253MEDIUMCVSS 5.5fixed in 2.30.6≥ 2.31.0, < 2.31.5+7 more2022-10-19
CVE-2022-39253 [MEDIUM] CWE-200 CVE-2022-39253: Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31
Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of t
nvd
CVE-2022-29187HIGHCVSS 7.8≥ 2.30.3, < 2.30.5≥ 2.31.2, < 2.31.4+6 more2022-07-12
CVE-2022-29187 [HIGH] CVE-2022-29187: Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4,
Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by the
nvd
CVE-2022-24765HIGHCVSS 7.8fixed in 2.35.22022-04-12
CVE-2022-24765 [MEDIUM] CWE-427 CVE-2022-24765: Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects use
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searchi
nvd
CVE-2022-24975HIGHCVSS 7.5≤ 2.35.12022-02-11
CVE-2022-24975 [HIGH] CWE-668 CVE-2022-24975: The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted conte
The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted content, aka the "GitBleed" issue. This could present a security risk if information-disclosure auditing processes rely on a clone operation without the --mirror option. Note: This has been disputed by multiple 3rd parties who believe this is an intended fea
nvd
CVE-2021-40330HIGHCVSS 7.5fixed in 2.30.12021-08-31
CVE-2021-40330 [HIGH] CVE-2021-40330: git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline char
git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring.
nvd
CVE-2021-21300HIGHCVSS 7.5≤ 2.14.2≥ 2.17.0, < 2.17.6+13 more2021-03-09
CVE-2021-21300 [HIGH] CWE-59 CVE-2021-21300: Git is an open-source distributed revision control system. In affected versions of Git a specially c
Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default f
nvd
CVE-2020-11008HIGHCVSS 7.5fixed in 2.17.5≥ 2.18.0, < 2.18.4+8 more2020-04-21
CVE-2020-11008 [MEDIUM] CWE-20 CVE-2020-11008: Affected versions of Git have a vulnerability whereby Git can be tricked into sending private creden
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open for an exploit where _some_ credential is leaked (but the attacker cannot control which one). Git uses e
nvd
1 / 3Next →