CVE-2025-58355: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in charmbracelet soft-serve
Soft Serve is a self-hostable Git server for the command line. In versions 0.9.1 and below, attackers can create or override arbitrary files with uncontrolled data through its SSH API. This issue is fixed in version 0.10.0.
AI Analysis
Technical Summary
CVE-2025-58355 is a high-severity path traversal vulnerability (CWE-22) affecting versions 0.9.1 and below of Soft Serve, a self-hostable Git server designed for command-line use. The vulnerability arises from improper limitation of pathname inputs within the SSH API, allowing an attacker with at least limited privileges (PR:L) to create or overwrite arbitrary files on the server filesystem with attacker-controlled data. This can lead to integrity compromise of the system by replacing or injecting malicious files. The vulnerability does not impact confidentiality or availability directly but has a significant impact on integrity. Exploitation requires network access (AV:N) and privileges, but no user interaction is needed (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The issue is fixed in version 0.10.0 of Soft Serve. No known exploits are currently reported in the wild, but the vulnerability’s characteristics and high CVSS score (7.7) indicate a strong potential for exploitation if left unpatched. The root cause is insufficient validation or sanitization of pathname inputs in the SSH API, allowing path traversal sequences (e.g., ../) to escape restricted directories and write files arbitrarily.
Potential Impact
For European organizations using Soft Serve versions prior to 0.10.0, this vulnerability poses a significant risk to the integrity of their source code repositories and server environments. Attackers could overwrite critical configuration files, inject malicious code into repositories, or place backdoors on the server, potentially leading to supply chain compromises or further lateral movement within the network. Given Soft Serve’s role as a Git server, the integrity of software development workflows could be undermined, affecting software quality and trustworthiness. While confidentiality and availability impacts are limited, the ability to alter files arbitrarily can have cascading effects on operational security and compliance, especially in regulated industries such as finance, healthcare, and critical infrastructure prevalent in Europe. The lack of known exploits currently provides a window for proactive patching, but the vulnerability’s network accessibility and low complexity of exploitation make it a high-priority risk.
Mitigation Recommendations
European organizations should immediately identify any deployments of Soft Serve versions below 0.10.0 and upgrade to version 0.10.0 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, organizations should restrict SSH API access to trusted internal networks and enforce strict access controls and monitoring on the Git server. Implementing file integrity monitoring on the server filesystem can help detect unauthorized file modifications. Additionally, organizations should audit repository and server configurations for suspicious changes and review logs for anomalous SSH API usage. Employing network segmentation to isolate Git servers and applying the principle of least privilege to user accounts accessing the SSH API will reduce exploitation risk. Finally, integrating vulnerability scanning into CI/CD pipelines to detect outdated Soft Serve versions can prevent future exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-58355: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in charmbracelet soft-serve
Description
Soft Serve is a self-hostable Git server for the command line. In versions 0.9.1 and below, attackers can create or override arbitrary files with uncontrolled data through its SSH API. This issue is fixed in version 0.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-58355 is a high-severity path traversal vulnerability (CWE-22) affecting versions 0.9.1 and below of Soft Serve, a self-hostable Git server designed for command-line use. The vulnerability arises from improper limitation of pathname inputs within the SSH API, allowing an attacker with at least limited privileges (PR:L) to create or overwrite arbitrary files on the server filesystem with attacker-controlled data. This can lead to integrity compromise of the system by replacing or injecting malicious files. The vulnerability does not impact confidentiality or availability directly but has a significant impact on integrity. Exploitation requires network access (AV:N) and privileges, but no user interaction is needed (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The issue is fixed in version 0.10.0 of Soft Serve. No known exploits are currently reported in the wild, but the vulnerability’s characteristics and high CVSS score (7.7) indicate a strong potential for exploitation if left unpatched. The root cause is insufficient validation or sanitization of pathname inputs in the SSH API, allowing path traversal sequences (e.g., ../) to escape restricted directories and write files arbitrarily.
Potential Impact
For European organizations using Soft Serve versions prior to 0.10.0, this vulnerability poses a significant risk to the integrity of their source code repositories and server environments. Attackers could overwrite critical configuration files, inject malicious code into repositories, or place backdoors on the server, potentially leading to supply chain compromises or further lateral movement within the network. Given Soft Serve’s role as a Git server, the integrity of software development workflows could be undermined, affecting software quality and trustworthiness. While confidentiality and availability impacts are limited, the ability to alter files arbitrarily can have cascading effects on operational security and compliance, especially in regulated industries such as finance, healthcare, and critical infrastructure prevalent in Europe. The lack of known exploits currently provides a window for proactive patching, but the vulnerability’s network accessibility and low complexity of exploitation make it a high-priority risk.
Mitigation Recommendations
European organizations should immediately identify any deployments of Soft Serve versions below 0.10.0 and upgrade to version 0.10.0 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, organizations should restrict SSH API access to trusted internal networks and enforce strict access controls and monitoring on the Git server. Implementing file integrity monitoring on the server filesystem can help detect unauthorized file modifications. Additionally, organizations should audit repository and server configurations for suspicious changes and review logs for anomalous SSH API usage. Employing network segmentation to isolate Git servers and applying the principle of least privilege to user accounts accessing the SSH API will reduce exploitation risk. Finally, integrating vulnerability scanning into CI/CD pipelines to detect outdated Soft Serve versions can prevent future exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-29T16:19:59.010Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b8d729ad5a09ad00fbecad
Added to database: 9/4/2025, 12:02:49 AM
Last enriched: 9/4/2025, 12:17:47 AM
Last updated: 9/4/2025, 2:09:19 PM
Views: 8
Related Threats
CVE-2025-25048: CWE-23 Relative Path Traversal in IBM Jazz Foundation
MediumCVE-2025-2694: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Sterling B2B Integrator
MediumCVE-2025-2667: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM Sterling B2B Integrator
LowCVE-2025-6785: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Tesla Model 3
MediumCVE-2025-41034: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in appRain appRain CMF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.