9.8 CVE-2025-21613

Enriched by CISA RCE
 

go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.
https://nvd.nist.gov/vuln/detail/CVE-2025-21613

Categories

CWE-88 : Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

References


 

AFFECTED (from MITRE)


Vendor Product Versions
go-git go-git
  • >= 4.0.0, < 5.13.0 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:a:go-git_project:go-git:*:*:*:*:*:go:*:* < 5.13.0


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
137 Parameter Injection
Medium
174 Flash Parameter Injection
Medium
41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
High
460 HTTP Parameter Pollution (HPP)
Medium
88 OS Command Injection
High