Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68144: CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in modelcontextprotocol servers

0
Medium
VulnerabilityCVE-2025-68144cvecve-2025-68144cwe-88
Published: Wed Dec 17 2025 (12/17/2025, 22:10:56 UTC)
Source: CVE Database V5
Vendor/Project: modelcontextprotocol
Product: servers

Description

In mcp-server-git versions prior to 2025.12.17, the git_diff and git_checkout functions passed user-controlled arguments directly to git CLI commands without sanitization. Flag-like values (e.g., `--output=/path/to/file` for `git_diff`) would be interpreted as command-line options rather than git refs, enabling arbitrary file overwrites. The fix adds validation that rejects arguments starting with - and verifies the argument resolves to a valid git ref via rev_parse before execution. Users are advised to update to 2025.12.17 resolve this issue when it is released.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:25:50 UTC

Technical Analysis

CVE-2025-68144 affects modelcontextprotocol servers, specifically the mcp-server-git component versions prior to 2025.12.17. The vulnerability arises from improper neutralization of argument delimiters (CWE-88) in the git_diff and git_checkout functions. These functions accept user-controlled input that is passed directly to underlying git CLI commands without proper sanitization or validation. Attackers can exploit this by injecting flag-like arguments (e.g., --output=/path/to/file) that git interprets as command-line options rather than git references. This leads to unintended command behavior, such as overwriting arbitrary files on the filesystem. The root cause is the failure to reject arguments starting with '-' and the lack of verification that the argument corresponds to a valid git reference. The patch introduced in version 2025.12.17 adds validation to reject such arguments and uses git rev_parse to confirm the argument is a valid git ref before execution. The vulnerability is exploitable remotely over the network without authentication but requires user interaction, such as submitting crafted input to the affected functions. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:H/SA:L) indicates a medium severity with high scope impact due to potential file overwrites. No known public exploits exist yet, but the vulnerability poses a risk to environments where mcp-server-git is used in automated workflows or exposed services.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized overwriting of files on systems running vulnerable versions of mcp-server-git, potentially disrupting development workflows, corrupting source code repositories, or overwriting critical configuration files. This could impact the integrity and availability of software development environments and continuous integration/continuous deployment (CI/CD) pipelines. Since the vulnerability does not require authentication but does require user interaction, attackers could exploit it via phishing or malicious input submissions in environments where mcp-server-git is exposed to untrusted users or automated inputs. The impact is particularly significant for organizations relying heavily on git-based workflows and automated DevOps tools integrating modelcontextprotocol servers. Although no confidentiality impact is indicated, the integrity and availability risks could lead to operational disruptions and increased remediation costs. European organizations with stringent compliance requirements around software integrity and supply chain security may face regulatory and reputational risks if exploited.

Mitigation Recommendations

European organizations should immediately plan to update all instances of mcp-server-git to version 2025.12.17 or later once released. Until the patch is applied, restrict access to mcp-server-git services to trusted users only and implement input validation controls at the application or network level to block arguments starting with '-'. Employ strict monitoring and logging of git command invocations to detect anomalous or unexpected flag usage. Integrate security scanning into CI/CD pipelines to detect vulnerable versions of mcp-server-git and prevent deployment of unpatched software. Educate users and developers about the risks of submitting untrusted input to git-related functions. Consider isolating or sandboxing git operations to limit the impact of potential file overwrites. Finally, conduct regular audits of file integrity in repositories and related configuration files to quickly identify unauthorized changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T19:06:04.108Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69432efa058703ef3fc97f3c

Added to database: 12/17/2025, 10:30:18 PM

Last enriched: 12/17/2025, 11:25:50 PM

Last updated: 12/18/2025, 10:49:24 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats