Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64494: CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences in charmbracelet soft-serve

0
Medium
VulnerabilityCVE-2025-64494cvecve-2025-64494cwe-150
Published: Sat Nov 08 2025 (11/08/2025, 01:19:01 UTC)
Source: CVE Database V5
Vendor/Project: charmbracelet
Product: soft-serve

Description

Soft Serve is a self-hostable Git server for the command line. In versions prior to 0.10.0, there are several places where the user can insert data (e.g. names) and ANSI escape sequences are not being removed, which can then be used, for example, to show fake alerts. In the same token, git messages, when printed, are also not being sanitized. This issue is fixed in version 0.10.0.

AI-Powered Analysis

AILast updated: 11/15/2025, 04:49:37 UTC

Technical Analysis

CVE-2025-64494 is a vulnerability classified under CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences) affecting charmbracelet's soft-serve, a self-hostable Git server designed for command-line use. In versions prior to 0.10.0, soft-serve fails to sanitize ANSI escape sequences embedded in user-controllable fields such as user names and git commit messages. These sequences can manipulate terminal output by injecting control characters that alter text color, cursor position, or display fake alerts, potentially misleading users or administrators. The vulnerability arises because the application directly outputs these unsanitized strings to terminal interfaces without filtering or escaping. Exploitation requires an attacker to have at least low-level privileges (PR:L) and network access (AV:N), and user interaction (UI:R) is necessary to view the malicious output. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS 3.1 base score is 4.6 (medium), reflecting limited confidentiality and integrity impact without affecting availability. Although no known exploits are currently reported in the wild, the flaw could be leveraged for social engineering, phishing within terminal sessions, or misleading users into executing harmful commands. The issue is resolved in soft-serve version 0.10.0 by properly sanitizing or removing ANSI escape sequences from user inputs and git messages before rendering.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to developers, DevOps teams, and administrators using soft-serve for internal Git hosting. The injection of ANSI escape sequences can lead to deceptive terminal outputs, potentially tricking users into executing malicious commands or disclosing sensitive information. While it does not directly compromise system availability or allow remote code execution, the manipulation of terminal displays can undermine trust in repository data and lead to indirect security breaches. Organizations relying on soft-serve for critical code repositories or CI/CD pipelines could face integrity risks if attackers exploit this flaw to inject misleading information. The impact is more pronounced in environments where terminal-based Git interactions are frequent and where users may not be trained to recognize manipulated outputs. Given the medium severity and the requirement for user interaction, the threat is moderate but should not be underestimated, especially in sectors with high security requirements such as finance, government, and critical infrastructure within Europe.

Mitigation Recommendations

European organizations should immediately upgrade all instances of soft-serve to version 0.10.0 or later, where the vulnerability is fixed. Until upgrades are completed, implement input validation and sanitization on all user-supplied data fields, specifically stripping or escaping ANSI escape sequences before rendering outputs in terminal interfaces. Educate developers and users to be cautious of unexpected terminal alerts or messages, especially those containing unusual formatting or control characters. Employ terminal emulators or shells that can restrict or disable the interpretation of ANSI escape sequences where feasible. Monitor Git server logs for suspicious inputs containing escape sequences and consider deploying intrusion detection rules to flag anomalous repository activity. Additionally, restrict access to soft-serve instances to trusted networks and authenticated users to reduce exposure. Regularly audit and review repository metadata and commit messages for suspicious content. Integrate security scanning tools that detect control character injection in code repositories as part of the CI/CD pipeline.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T19:12:25.103Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690e9f0a3a8fd010ecd0f4f6

Added to database: 11/8/2025, 1:38:18 AM

Last enriched: 11/15/2025, 4:49:37 AM

Last updated: 12/22/2025, 6:45:54 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-15014: SQL Injection in loganhong php loganSite

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

High
VulnerabilityMon Dec 22 2025

CVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats