CVE-2025-68144: CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in modelcontextprotocol servers
In mcp-server-git versions prior to 2025.12.17, the git_diff and git_checkout functions passed user-controlled arguments directly to git CLI commands without sanitization. Flag-like values (e.g., `--output=/path/to/file` for `git_diff`) would be interpreted as command-line options rather than git refs, enabling arbitrary file overwrites. The fix adds validation that rejects arguments starting with - and verifies the argument resolves to a valid git ref via rev_parse before execution. Users are advised to update to 2025.12.17 resolve this issue when it is released.
AI Analysis
Technical Summary
CVE-2025-68144 affects modelcontextprotocol servers, specifically the mcp-server-git component versions prior to 2025.12.17. The vulnerability arises from improper neutralization of argument delimiters (CWE-88) in the git_diff and git_checkout functions. These functions accept user-controlled input that is passed directly to underlying git CLI commands without proper sanitization or validation. Attackers can exploit this by injecting flag-like arguments (e.g., --output=/path/to/file) that git interprets as command-line options rather than git references. This leads to unintended command behavior, such as overwriting arbitrary files on the filesystem. The root cause is the failure to reject arguments starting with '-' and the lack of verification that the argument corresponds to a valid git reference. The patch introduced in version 2025.12.17 adds validation to reject such arguments and uses git rev_parse to confirm the argument is a valid git ref before execution. The vulnerability is exploitable remotely over the network without authentication but requires user interaction, such as submitting crafted input to the affected functions. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:H/SA:L) indicates a medium severity with high scope impact due to potential file overwrites. No known public exploits exist yet, but the vulnerability poses a risk to environments where mcp-server-git is used in automated workflows or exposed services.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized overwriting of files on systems running vulnerable versions of mcp-server-git, potentially disrupting development workflows, corrupting source code repositories, or overwriting critical configuration files. This could impact the integrity and availability of software development environments and continuous integration/continuous deployment (CI/CD) pipelines. Since the vulnerability does not require authentication but does require user interaction, attackers could exploit it via phishing or malicious input submissions in environments where mcp-server-git is exposed to untrusted users or automated inputs. The impact is particularly significant for organizations relying heavily on git-based workflows and automated DevOps tools integrating modelcontextprotocol servers. Although no confidentiality impact is indicated, the integrity and availability risks could lead to operational disruptions and increased remediation costs. European organizations with stringent compliance requirements around software integrity and supply chain security may face regulatory and reputational risks if exploited.
Mitigation Recommendations
European organizations should immediately plan to update all instances of mcp-server-git to version 2025.12.17 or later once released. Until the patch is applied, restrict access to mcp-server-git services to trusted users only and implement input validation controls at the application or network level to block arguments starting with '-'. Employ strict monitoring and logging of git command invocations to detect anomalous or unexpected flag usage. Integrate security scanning into CI/CD pipelines to detect vulnerable versions of mcp-server-git and prevent deployment of unpatched software. Educate users and developers about the risks of submitting untrusted input to git-related functions. Consider isolating or sandboxing git operations to limit the impact of potential file overwrites. Finally, conduct regular audits of file integrity in repositories and related configuration files to quickly identify unauthorized changes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2025-68144: CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in modelcontextprotocol servers
Description
In mcp-server-git versions prior to 2025.12.17, the git_diff and git_checkout functions passed user-controlled arguments directly to git CLI commands without sanitization. Flag-like values (e.g., `--output=/path/to/file` for `git_diff`) would be interpreted as command-line options rather than git refs, enabling arbitrary file overwrites. The fix adds validation that rejects arguments starting with - and verifies the argument resolves to a valid git ref via rev_parse before execution. Users are advised to update to 2025.12.17 resolve this issue when it is released.
AI-Powered Analysis
Technical Analysis
CVE-2025-68144 affects modelcontextprotocol servers, specifically the mcp-server-git component versions prior to 2025.12.17. The vulnerability arises from improper neutralization of argument delimiters (CWE-88) in the git_diff and git_checkout functions. These functions accept user-controlled input that is passed directly to underlying git CLI commands without proper sanitization or validation. Attackers can exploit this by injecting flag-like arguments (e.g., --output=/path/to/file) that git interprets as command-line options rather than git references. This leads to unintended command behavior, such as overwriting arbitrary files on the filesystem. The root cause is the failure to reject arguments starting with '-' and the lack of verification that the argument corresponds to a valid git reference. The patch introduced in version 2025.12.17 adds validation to reject such arguments and uses git rev_parse to confirm the argument is a valid git ref before execution. The vulnerability is exploitable remotely over the network without authentication but requires user interaction, such as submitting crafted input to the affected functions. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:H/SA:L) indicates a medium severity with high scope impact due to potential file overwrites. No known public exploits exist yet, but the vulnerability poses a risk to environments where mcp-server-git is used in automated workflows or exposed services.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized overwriting of files on systems running vulnerable versions of mcp-server-git, potentially disrupting development workflows, corrupting source code repositories, or overwriting critical configuration files. This could impact the integrity and availability of software development environments and continuous integration/continuous deployment (CI/CD) pipelines. Since the vulnerability does not require authentication but does require user interaction, attackers could exploit it via phishing or malicious input submissions in environments where mcp-server-git is exposed to untrusted users or automated inputs. The impact is particularly significant for organizations relying heavily on git-based workflows and automated DevOps tools integrating modelcontextprotocol servers. Although no confidentiality impact is indicated, the integrity and availability risks could lead to operational disruptions and increased remediation costs. European organizations with stringent compliance requirements around software integrity and supply chain security may face regulatory and reputational risks if exploited.
Mitigation Recommendations
European organizations should immediately plan to update all instances of mcp-server-git to version 2025.12.17 or later once released. Until the patch is applied, restrict access to mcp-server-git services to trusted users only and implement input validation controls at the application or network level to block arguments starting with '-'. Employ strict monitoring and logging of git command invocations to detect anomalous or unexpected flag usage. Integrate security scanning into CI/CD pipelines to detect vulnerable versions of mcp-server-git and prevent deployment of unpatched software. Educate users and developers about the risks of submitting untrusted input to git-related functions. Consider isolating or sandboxing git operations to limit the impact of potential file overwrites. Finally, conduct regular audits of file integrity in repositories and related configuration files to quickly identify unauthorized changes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-15T19:06:04.108Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69432efa058703ef3fc97f3c
Added to database: 12/17/2025, 10:30:18 PM
Last enriched: 12/17/2025, 11:25:50 PM
Last updated: 12/18/2025, 10:49:24 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14364: CWE-862 Missing Authorization in kraftplugins Demo Importer Plus
HighCVE-2025-13730: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in daggerhart OpenID Connect Generic Client
MediumCVE-2025-13641: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in smub Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery
HighCVE-2025-64997: CWE-280: Improper Handling of Insufficient Permissions or Privileges in Checkmk GmbH Checkmk
MediumCVE-2025-14874: Improper Check or Handling of Exceptional Conditions in Red Hat Red Hat Advanced Cluster Management for Kubernetes 2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.