Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66219: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in shama willitmerge

0
Medium
VulnerabilityCVE-2025-66219cvecve-2025-66219cwe-77
Published: Sat Nov 29 2025 (11/29/2025, 01:34:33 UTC)
Source: CVE Database V5
Vendor/Project: shama
Product: willitmerge

Description

willitmerge is a command line tool to check if pull requests are mergeable. In versions 0.2.1 and prior, there is a command Injection vulnerability in willitmerge. The vulnerability manifests in this package due to the use of insecure child process execution API (exec) to which it concatenates user input, whether provided to the command-line flag, or is in user control in the target repository. At time of publication, no known fix is public.

AI-Powered Analysis

AILast updated: 11/29/2025, 02:08:34 UTC

Technical Analysis

CVE-2025-66219 identifies a command injection vulnerability in the open-source command line tool willitmerge, developed by the shama project, which is designed to determine if pull requests are mergeable. The vulnerability exists in versions 0.2.1 and earlier due to the unsafe use of the Node.js exec API (or a similar child process execution function) that concatenates user-controlled input directly into shell commands without proper sanitization or escaping. This improper neutralization of special elements (CWE-77) allows an attacker to inject arbitrary shell commands that the system will execute with the privileges of the running process. The vulnerability can be triggered by supplying crafted input either via command-line flags or through manipulated content in the target repository, which willitmerge processes. Since the tool is typically used in automated CI/CD pipelines or developer environments, exploitation can occur remotely without authentication or user interaction, increasing the attack surface. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact on integrity (VI:L), with no impact on confidentiality or availability. No patches or mitigations have been publicly released at the time of disclosure, and no known exploits are currently in the wild. This vulnerability poses a risk of arbitrary command execution, potentially leading to unauthorized code execution, data tampering, or further compromise of development infrastructure.

Potential Impact

For European organizations, especially those relying on willitmerge within their software development lifecycle, this vulnerability could lead to unauthorized command execution on build or integration servers. This may result in codebase tampering, injection of malicious code into production branches, or compromise of CI/CD infrastructure. The integrity of software artifacts and development pipelines could be undermined, causing cascading effects on software supply chain security. Organizations handling sensitive or regulated data may face compliance risks if attackers leverage this vulnerability to exfiltrate data or disrupt operations. Since exploitation requires no authentication or user interaction, attackers can remotely target vulnerable systems, increasing the risk of widespread impact. The medium severity rating reflects the significant integrity impact and ease of exploitation, though confidentiality and availability impacts are limited. European entities with mature DevOps practices and extensive use of open-source tools are particularly exposed.

Mitigation Recommendations

Immediate mitigation involves discontinuing use of willitmerge versions 0.2.1 and earlier until a secure patch is released. Organizations should audit their CI/CD pipelines and development environments to identify and isolate instances of willitmerge. Applying strict input validation and sanitization on any user-supplied data that may reach willitmerge is critical to reduce injection risk. Running willitmerge processes with least privilege and within isolated containers or sandboxed environments can limit potential damage from exploitation. Monitoring and logging command execution and unusual process activity in build environments can help detect exploitation attempts. If feasible, replacing willitmerge with alternative tools that do not exhibit this vulnerability is advisable. Organizations should also track vendor advisories for forthcoming patches and apply them promptly once available. Incorporating security scanning tools that detect command injection patterns in code and configurations can prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.679Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692a51f32a13ea799fcc56d7

Added to database: 11/29/2025, 1:52:51 AM

Last enriched: 11/29/2025, 2:08:34 AM

Last updated: 12/4/2025, 10:06:23 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats