Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27613: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in j6t gitk

0
Low
VulnerabilityCVE-2025-27613cvecve-2025-27613cwe-78
Published: Thu Jul 10 2025 (07/10/2025, 14:58:16 UTC)
Source: CVE Database V5
Vendor/Project: j6t
Product: gitk

Description

Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.

AI-Powered Analysis

AILast updated: 11/10/2025, 19:05:13 UTC

Technical Analysis

CVE-2025-27613 is an OS command injection vulnerability classified under CWE-78, affecting the j6t gitk tool, a graphical Git history browser implemented in Tcl/Tk. The vulnerability arises when a user clones an untrusted Git repository and runs gitk without additional command-line arguments. Specifically, if the 'Support per-file encoding' option is enabled in gitk's preferences (disabled by default), or if the user activates the 'Show origin of this line' feature in the main window, gitk may create or truncate files for which the user has write permissions. This behavior stems from improper neutralization of special elements in OS commands, allowing an attacker to influence file operations on the host system. The affected versions span from 1.7.0 up to multiple incremental patched versions before 2.50.1, with fixes released in versions 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1. The vulnerability requires local user interaction and no privileges, limiting its exploitation scope. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N) indicates low attack complexity, no privileges required, user interaction needed, and a scope change due to the potential impact on other components. The impact is limited to integrity, with no confidentiality or availability loss. No known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, the primary impact of CVE-2025-27613 lies in the potential unauthorized modification or truncation of files by users running vulnerable gitk versions on their local machines. This could lead to data integrity issues, especially in development environments where gitk is used to browse and analyze Git repositories. While the vulnerability does not directly compromise confidentiality or availability, the ability to alter files could facilitate further attacks or disrupt development workflows. Organizations relying on gitk for code review or repository analysis may face risks if untrusted repositories are cloned and the vulnerable features are enabled or used. The low CVSS score and requirement for user interaction reduce the likelihood of widespread exploitation, but insider threats or social engineering could increase risk. European entities with stringent data integrity requirements or regulatory obligations should consider this vulnerability significant enough to warrant prompt remediation.

Mitigation Recommendations

To mitigate CVE-2025-27613, European organizations should: 1) Upgrade gitk installations to the latest patched versions (2.43.7 or later as specified) to eliminate the vulnerability. 2) Disable the 'Support per-file encoding' option in gitk preferences unless absolutely necessary, as it is disabled by default and its activation contributes to the vulnerability. 3) Avoid using the 'Show origin of this line' feature until patched versions are deployed. 4) Educate developers and users about the risks of cloning untrusted repositories and exercising caution when interacting with repository visualization tools. 5) Implement endpoint security controls to monitor and restrict unauthorized file modifications initiated by user applications. 6) Employ application whitelisting or sandboxing for gitk to limit its ability to affect critical files. 7) Regularly audit development environments for outdated gitk versions and enforce update policies. These steps go beyond generic advice by focusing on configuration management, user awareness, and environment hardening specific to gitk usage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-03-03T15:10:34.079Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686fd5b8a83201eaaca851ac

Added to database: 7/10/2025, 3:01:12 PM

Last enriched: 11/10/2025, 7:05:13 PM

Last updated: 11/20/2025, 6:56:15 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats