Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27614: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in j6t gitk

0
High
VulnerabilityCVE-2025-27614cvecve-2025-27614cwe-78
Published: Thu Jul 10 2025 (07/10/2025, 15:02:25 UTC)
Source: CVE Database V5
Vendor/Project: j6t
Product: gitk

Description

Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking gitk filename, where filename has a particular structure. The script is run with the privileges of the user. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:45:20 UTC

Technical Analysis

CVE-2025-27614 is an OS command injection vulnerability classified under CWE-78 affecting the j6t gitk tool, a graphical Git history browser implemented in Tcl/Tk. The vulnerability arises from improper neutralization of special elements used in OS commands when gitk is invoked with a crafted filename argument. Starting with version 2.41.0, an attacker can create a malicious Git repository containing a filename structured to execute arbitrary scripts (e.g., shell, Perl, Python) when a user runs gitk filename. This execution occurs with the privileges of the user running gitk, potentially leading to full system compromise. The attack requires social engineering to convince the user to clone the malicious repository and invoke gitk with the crafted filename, thus requiring user interaction and local access. The vulnerability affects multiple version ranges with patches released incrementally from 2.43.7 through 2.50.1. The CVSS v3.1 score is 8.6 (high severity) reflecting local attack vector, low attack complexity, no privileges required, user interaction required, and complete impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the potential impact is significant given the ability to execute arbitrary code. This vulnerability is particularly relevant to organizations relying heavily on Git and gitk for software development and version control, as exploitation could lead to unauthorized code execution, data theft, or system disruption.

Potential Impact

For European organizations, the impact of CVE-2025-27614 can be substantial. Many enterprises, especially in technology, finance, and government sectors, use Git and gitk for source code management and auditing. Exploitation could allow attackers to execute arbitrary code with user-level privileges, potentially leading to data breaches, insertion of malicious code into software projects, or disruption of development workflows. Confidentiality is at risk as attackers could access sensitive source code and internal documentation. Integrity is compromised by the possibility of injecting malicious scripts or altering code history. Availability could be affected if attackers deploy destructive payloads or ransomware. The requirement for user interaction and local access somewhat limits the attack surface but does not eliminate risk, especially in environments where developers frequently clone external repositories or use gitk to inspect untrusted code. The vulnerability could also facilitate lateral movement within networks if exploited on developer workstations connected to corporate infrastructure. Overall, the threat poses a high risk to European organizations with active software development pipelines using vulnerable gitk versions.

Mitigation Recommendations

To mitigate CVE-2025-27614, European organizations should immediately upgrade all gitk installations to the latest patched versions (2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, or 2.50.1). Organizations should audit their environments to identify all instances of gitk and verify version compliance. Implement strict policies to avoid cloning and inspecting Git repositories from untrusted or unknown sources. Educate developers and users about the risks of opening repositories and files from unverified origins, emphasizing caution when invoking gitk with filenames. Employ endpoint protection solutions capable of detecting suspicious script execution triggered by gitk. Consider restricting the use of gitk to isolated or sandboxed environments where possible. Additionally, monitor logs for unusual gitk usage patterns or unexpected script executions. Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely updates. For critical environments, consider disabling gitk temporarily until patched versions are deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-03-03T15:10:34.080Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686fd939a83201eaaca86b08

Added to database: 7/10/2025, 3:16:09 PM

Last enriched: 11/4/2025, 9:45:20 PM

Last updated: 11/24/2025, 2:26:24 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats