Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66219: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in shama willitmerge

0
Medium
VulnerabilityCVE-2025-66219cvecve-2025-66219cwe-77
Published: Sat Nov 29 2025 (11/29/2025, 01:34:33 UTC)
Source: CVE Database V5
Vendor/Project: shama
Product: willitmerge

Description

willitmerge is a command line tool to check if pull requests are mergeable. In versions 0.2.1 and prior, there is a command Injection vulnerability in willitmerge. The vulnerability manifests in this package due to the use of insecure child process execution API (exec) to which it concatenates user input, whether provided to the command-line flag, or is in user control in the target repository. At time of publication, no known fix is public.

AI-Powered Analysis

AILast updated: 12/06/2025, 04:29:33 UTC

Technical Analysis

CVE-2025-66219 identifies a command injection vulnerability in the open-source command line tool willitmerge, developed by the shama project. willitmerge is designed to programmatically determine if pull requests can be merged, commonly integrated into CI/CD pipelines. Versions 0.2.1 and earlier use the Node.js exec API insecurely by concatenating user-controlled input directly into shell commands without neutralizing special characters or sanitizing inputs. This improper neutralization (CWE-77) allows an attacker to inject arbitrary shell commands that the system executes with the same privileges as the willitmerge process. The vulnerability can be triggered remotely without authentication or user interaction, as inputs can come from command-line flags or repository content under user control. Exploitation could allow attackers to execute arbitrary commands, potentially altering code, injecting malicious payloads, or disrupting development workflows. At the time of publication, no patch or fix is publicly available, increasing the risk for organizations relying on this tool. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on integrity. No known exploits in the wild have been reported yet, but the vulnerability’s nature and ease of exploitation make it a significant risk for software supply chain security.

Potential Impact

For European organizations, especially those with mature DevOps and CI/CD practices integrating willitmerge, this vulnerability poses a risk of unauthorized command execution within development environments. Attackers could manipulate pull request checks to inject malicious code or disrupt merge processes, potentially leading to compromised codebases or supply chain attacks. This could affect software integrity, delay development cycles, and introduce backdoors or vulnerabilities into production systems. The medium severity rating reflects limited impact on confidentiality and availability but a tangible threat to integrity. Organizations relying on automated merge checks in open source or internal repositories are particularly vulnerable. The absence of a patch increases exposure duration, and attackers exploiting this flaw could target critical infrastructure or sensitive projects, amplifying the impact. Additionally, compromised development tools could undermine trust in software supply chains, a key concern for European regulators and industries.

Mitigation Recommendations

Immediate mitigation involves discontinuing use of willitmerge versions 0.2.1 and earlier until a secure update is released. Organizations should audit their CI/CD pipelines to identify usage of willitmerge and isolate or sandbox its execution environment to limit potential damage from exploitation. Input validation and sanitization should be implemented at the integration points where user input reaches willitmerge, rejecting or escaping special shell characters. Consider replacing willitmerge with alternative tools that do not use unsafe command execution or that have verified secure coding practices. Monitoring and logging of CI/CD activities should be enhanced to detect anomalous command executions or unexpected merge behaviors. Engage with the vendor or open source maintainers to track patch releases and apply updates promptly. For critical environments, implement strict access controls around repository management and pull request approvals to reduce the risk of malicious input reaching willitmerge. Finally, educate developers and DevOps teams about the risks of command injection vulnerabilities and secure coding practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.679Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692a51f32a13ea799fcc56d7

Added to database: 11/29/2025, 1:52:51 AM

Last enriched: 12/6/2025, 4:29:33 AM

Last updated: 1/18/2026, 8:31:47 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats