PT-2025-51936 · Unknown · Git-Mcp-Server
Yardenporat
·
Published
2025-12-17
·
Updated
2026-02-25
·
CVE-2025-68143
CVSS v4.0
6.5
6.5
Medium
| Base vector | Vector | AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H |
Name of the Vulnerable Software and Affected Versions
mcp-server-git versions prior to 2025.9.25
mcp-server-git versions prior to 2025.12.18
Description
The Model Context Protocol Servers, specifically the mcp-server-git component, contains a flaw in the
git init tool. Prior to version 2025.9.25, this tool permitted the creation of Git repositories at arbitrary filesystem locations without proper validation. This allowed operation on any directory accessible to the server process, potentially enabling subsequent git operations on those directories. The tool has been removed in later versions as the server is intended to operate on existing repositories only. Exploitation of this issue, in conjunction with the Filesystem MCP server, could lead to unauthorized file access and potential remote code execution. The issue can be triggered through prompt injection via malicious content such as README files or issues.Recommendations
mcp-server-git versions prior to 2025.9.25: Upgrade to version 2025.9.25 or newer.
mcp-server-git versions prior to 2025.12.18: Upgrade to version 2025.12.18 or newer.
Exploit
Fix
RCE
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
CVE-2025-68143
GHSA-5CGR-J3JF-JW3V
Affected Products
Git-Mcp-Server
References · 21
- 🔥 https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68143.json⭐ 2441 🔗 556 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-68143 · Security Note
- https://osv.dev/vulnerability/CVE-2025-68143 · Vendor Advisory
- https://github.com/modelcontextprotocol/servers/commit/eac56e7bcde48fb64d5a973924d05d69a7d876e6⭐ 77472 🔗 9382 · Note
- https://github.com/modelcontextprotocol/servers/security/advisories/GHSA-5cgr-j3jf-jw3v⭐ 77472 🔗 9382 · Note
- https://twitter.com/grok/status/2018271298598683033 · Twitter Post
- https://twitter.com/transilienceai/status/2018129993185006050 · Twitter Post
- https://twitter.com/karbonmade/status/2026074164583620842 · Twitter Post
- https://twitter.com/ThreatSynop/status/2014080296866480526 · Twitter Post
- https://twitter.com/ThreatSynop/status/2013638160752746582 · Twitter Post
- https://twitter.com/VulmonFeeds/status/2001618705726255573 · Twitter Post
- https://twitter.com/dailycve/status/2001432652377726982 · Twitter Post
- https://twitter.com/ThreatSynop/status/2013956305514349050 · Twitter Post
- https://twitter.com/socradar/status/2013956495046857087 · Twitter Post
- https://twitter.com/0xsailon/status/2024409271484764268 · Twitter Post