CVE-2025-27613: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in j6t gitk
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
AI Analysis
Technical Summary
CVE-2025-27613 is an OS command injection vulnerability classified under CWE-78, affecting the j6t gitk tool, a graphical Git history browser implemented in Tcl/Tk. The vulnerability arises when a user clones an untrusted Git repository and runs gitk without additional command-line arguments. Specifically, if the 'Support per-file encoding' option is enabled in gitk's preferences (disabled by default), or if the user activates the 'Show origin of this line' feature in the main window, gitk may create or truncate files for which the user has write permissions. This behavior stems from improper neutralization of special elements in OS commands, allowing an attacker to influence file operations on the host system. The affected versions span from 1.7.0 up to multiple incremental patched versions before 2.50.1, with fixes released in versions 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1. The vulnerability requires local user interaction and no privileges, limiting its exploitation scope. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N) indicates low attack complexity, no privileges required, user interaction needed, and a scope change due to the potential impact on other components. The impact is limited to integrity, with no confidentiality or availability loss. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, the primary impact of CVE-2025-27613 lies in the potential unauthorized modification or truncation of files by users running vulnerable gitk versions on their local machines. This could lead to data integrity issues, especially in development environments where gitk is used to browse and analyze Git repositories. While the vulnerability does not directly compromise confidentiality or availability, the ability to alter files could facilitate further attacks or disrupt development workflows. Organizations relying on gitk for code review or repository analysis may face risks if untrusted repositories are cloned and the vulnerable features are enabled or used. The low CVSS score and requirement for user interaction reduce the likelihood of widespread exploitation, but insider threats or social engineering could increase risk. European entities with stringent data integrity requirements or regulatory obligations should consider this vulnerability significant enough to warrant prompt remediation.
Mitigation Recommendations
To mitigate CVE-2025-27613, European organizations should: 1) Upgrade gitk installations to the latest patched versions (2.43.7 or later as specified) to eliminate the vulnerability. 2) Disable the 'Support per-file encoding' option in gitk preferences unless absolutely necessary, as it is disabled by default and its activation contributes to the vulnerability. 3) Avoid using the 'Show origin of this line' feature until patched versions are deployed. 4) Educate developers and users about the risks of cloning untrusted repositories and exercising caution when interacting with repository visualization tools. 5) Implement endpoint security controls to monitor and restrict unauthorized file modifications initiated by user applications. 6) Employ application whitelisting or sandboxing for gitk to limit its ability to affect critical files. 7) Regularly audit development environments for outdated gitk versions and enforce update policies. These steps go beyond generic advice by focusing on configuration management, user awareness, and environment hardening specific to gitk usage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-27613: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in j6t gitk
Description
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-27613 is an OS command injection vulnerability classified under CWE-78, affecting the j6t gitk tool, a graphical Git history browser implemented in Tcl/Tk. The vulnerability arises when a user clones an untrusted Git repository and runs gitk without additional command-line arguments. Specifically, if the 'Support per-file encoding' option is enabled in gitk's preferences (disabled by default), or if the user activates the 'Show origin of this line' feature in the main window, gitk may create or truncate files for which the user has write permissions. This behavior stems from improper neutralization of special elements in OS commands, allowing an attacker to influence file operations on the host system. The affected versions span from 1.7.0 up to multiple incremental patched versions before 2.50.1, with fixes released in versions 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1. The vulnerability requires local user interaction and no privileges, limiting its exploitation scope. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N) indicates low attack complexity, no privileges required, user interaction needed, and a scope change due to the potential impact on other components. The impact is limited to integrity, with no confidentiality or availability loss. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, the primary impact of CVE-2025-27613 lies in the potential unauthorized modification or truncation of files by users running vulnerable gitk versions on their local machines. This could lead to data integrity issues, especially in development environments where gitk is used to browse and analyze Git repositories. While the vulnerability does not directly compromise confidentiality or availability, the ability to alter files could facilitate further attacks or disrupt development workflows. Organizations relying on gitk for code review or repository analysis may face risks if untrusted repositories are cloned and the vulnerable features are enabled or used. The low CVSS score and requirement for user interaction reduce the likelihood of widespread exploitation, but insider threats or social engineering could increase risk. European entities with stringent data integrity requirements or regulatory obligations should consider this vulnerability significant enough to warrant prompt remediation.
Mitigation Recommendations
To mitigate CVE-2025-27613, European organizations should: 1) Upgrade gitk installations to the latest patched versions (2.43.7 or later as specified) to eliminate the vulnerability. 2) Disable the 'Support per-file encoding' option in gitk preferences unless absolutely necessary, as it is disabled by default and its activation contributes to the vulnerability. 3) Avoid using the 'Show origin of this line' feature until patched versions are deployed. 4) Educate developers and users about the risks of cloning untrusted repositories and exercising caution when interacting with repository visualization tools. 5) Implement endpoint security controls to monitor and restrict unauthorized file modifications initiated by user applications. 6) Employ application whitelisting or sandboxing for gitk to limit its ability to affect critical files. 7) Regularly audit development environments for outdated gitk versions and enforce update policies. These steps go beyond generic advice by focusing on configuration management, user awareness, and environment hardening specific to gitk usage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-03-03T15:10:34.079Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686fd5b8a83201eaaca851ac
Added to database: 7/10/2025, 3:01:12 PM
Last enriched: 11/10/2025, 7:05:13 PM
Last updated: 11/20/2025, 6:56:15 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-3625: Plaintext Storage of a Password
HighCVE-2024-3624: Plaintext Storage of a Password
HighCVE-2025-63700: n/a
HighCVE-2024-2307: Improper Verification of Cryptographic Signature
MediumCVE-2024-2002: Double Free
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.