Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46334: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in j6t git-gui

0
High
VulnerabilityCVE-2025-46334cvecve-2025-46334cwe-78
Published: Thu Jul 10 2025 (07/10/2025, 15:06:12 UTC)
Source: CVE Database V5
Vendor/Project: j6t
Product: git-gui

Description

Git GUI allows you to use the Git source control management tools via a GUI. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. Due to the unfortunate design of Tcl on Windows, the search path when looking for an executable always includes the current directory. The mentioned programs are invoked when the user selects Git Bash or Browse Files from the menu. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:50:15 UTC

Technical Analysis

CVE-2025-46334 is an OS command injection vulnerability classified under CWE-78 affecting the j6t git-gui tool on Windows platforms. Git-gui provides a graphical interface to Git SCM tools and invokes executables such as sh.exe or textconv filter programs (e.g., astextplain) when users select Git Bash or Browse Files from the menu. Due to the Tcl interpreter's design on Windows, the search path for executables includes the current directory, which is atypical and insecure. This behavior allows a malicious Git repository to include crafted versions of these executables in its directory. When the user interacts with the GUI and triggers these commands, the malicious executables run with the user's privileges, leading to arbitrary code execution. The vulnerability affects multiple versions of git-gui prior to 2.43.7 and various subsequent minor versions before their respective patches. The CVSS v3.1 score is 8.6 (high severity), reflecting local attack vector, low complexity, no privileges required, user interaction needed, and a scope change with high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of publication. The vulnerability is mitigated by updating to patched versions starting from 2.43.7 and later incremental patches.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for software development teams using git-gui on Windows. Successful exploitation allows attackers to execute arbitrary code with the user's privileges, potentially leading to data theft, unauthorized system modifications, or disruption of development environments. This can compromise source code integrity, leak sensitive intellectual property, and disrupt business operations. Since the attack requires user interaction (selecting Git Bash or Browse Files), social engineering or malicious repository distribution could be used to trigger the exploit. Organizations with distributed development teams or those relying on open-source repositories are particularly vulnerable. The impact extends to supply chain security, as malicious repositories could be crafted to exploit this flaw. Given the high CVSS score, the vulnerability could facilitate lateral movement within networks if exploited on developer machines connected to corporate infrastructure.

Mitigation Recommendations

European organizations should immediately identify all instances of j6t git-gui running on Windows and verify their versions. All affected versions prior to 2.43.7 and the specified intermediate versions should be upgraded to the latest patched releases (2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, or 2.50.1). Additionally, organizations should implement strict controls on repository sources, ensuring only trusted repositories are cloned or used. User education is critical to prevent interaction with untrusted repositories or suspicious GUI options. Employ endpoint protection solutions capable of detecting anomalous execution of unexpected binaries in development directories. Consider restricting execution permissions on repository directories to prevent execution of unauthorized binaries. Monitoring and alerting on unusual process creation events related to git-gui or sh.exe can help detect exploitation attempts. Finally, incorporate this vulnerability into supply chain risk assessments and secure software development lifecycle (SDLC) practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-22T22:41:54.911Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686fd939a83201eaaca86b0c

Added to database: 7/10/2025, 3:16:09 PM

Last enriched: 11/4/2025, 9:50:15 PM

Last updated: 11/24/2025, 8:14:30 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats