PT-2025-28647 · Git+12 · Git+12
Dgl
·
Published
2025-07-08
·
Updated
2026-03-10
·
CVE-2025-48384
CVSS v3.1
8.0
High
| AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Git versions 2.43.7 through 2.50.1
Description
Git contains a link following vulnerability stemming from inconsistent handling of carriage return characters in configuration files. This flaw allows attackers to execute arbitrary code via malicious repositories, specifically through crafted submodules. The vulnerability enables arbitrary file writes and remote code execution (RCE) on Unix-like systems. Exploitation is actively occurring, and a proof-of-concept (PoC) is available. The vulnerability affects Git CLI versions 2.50.0 and earlier on macOS and Linux. The issue arises because Git strips carriage return characters when reading config values but does not quote them when writing, leading to altered paths during submodule initialization and potential execution of malicious hooks.
Recommendations
Update Git to version 2.50.1 or later.
Exploit
Fix
RCE
Link Following
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Debian
Git
Linuxmint
Apple Macos
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu