CVE-2026-22253: CWE-863: Incorrect Authorization in charmbracelet soft-serve
Soft Serve is a self-hostable Git server for the command line. Prior to version 0.11.2, an authorization bypass in the LFS lock deletion endpoint allows any authenticated user with repository write access to delete locks owned by other users by setting the force flag. The vulnerable code path processes force deletions before retrieving user context, bypassing ownership validation entirely. This issue has been patched in version 0.11.2.
AI Analysis
Technical Summary
CVE-2026-22253 is a medium-severity authorization bypass vulnerability identified in charmbracelet's Soft Serve, a self-hosted Git server primarily used via command line. The flaw exists in versions prior to 0.11.2 within the Large File Storage (LFS) lock deletion endpoint. Specifically, when an authenticated user with write permissions attempts to delete an LFS lock, the server processes requests with the 'force' flag before verifying the user's ownership of the lock. This sequence allows such users to delete locks owned by other users, bypassing intended authorization controls. The vulnerability stems from incorrect authorization logic (CWE-863), where the force deletion path does not properly validate user context before proceeding. While confidentiality is unaffected, the integrity and availability of repository locks can be compromised, potentially disrupting collaborative workflows or enabling denial of service on repository resources. Exploitation requires authenticated write access to the repository but no additional user interaction. The vulnerability was publicly disclosed on January 8, 2026, with no known exploits in the wild at the time of publication. The issue has been addressed in Soft Serve version 0.11.2, which corrects the authorization sequence to ensure ownership validation precedes any forced deletion operation.
Potential Impact
For European organizations utilizing Soft Serve for Git repository management, this vulnerability poses a risk to the integrity and availability of repository locks, which are critical for coordinating concurrent file edits in large file storage scenarios. Unauthorized deletion of LFS locks by users with write access can lead to conflicts, data corruption, or workflow disruptions, potentially delaying development cycles or causing accidental overwrites. While the breach does not expose confidential data, the disruption to development processes can have operational and reputational consequences, especially for organizations relying on strict version control and collaboration protocols. The requirement for authenticated write access limits the attack surface to internal or trusted users, but insider threats or compromised credentials could be leveraged to exploit this vulnerability. Given the increasing adoption of self-hosted Git solutions in European tech sectors, failure to patch could impact software development integrity and availability.
Mitigation Recommendations
European organizations should immediately upgrade all Soft Serve instances to version 0.11.2 or later, where the authorization bypass has been fixed. Until upgrades are completed, organizations should restrict repository write access to trusted users only and monitor LFS lock deletion activities for anomalies, such as unexpected forced deletions. Implementing enhanced logging and alerting on repository lock operations can help detect potential exploitation attempts. Additionally, organizations should enforce strong authentication mechanisms and credential hygiene to reduce the risk of compromised accounts being used to exploit this vulnerability. Regular audits of repository permissions and user roles will further minimize exposure. Where feasible, consider isolating critical repositories or employing additional access controls to limit the impact of potential misuse of write privileges.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2026-22253: CWE-863: Incorrect Authorization in charmbracelet soft-serve
Description
Soft Serve is a self-hostable Git server for the command line. Prior to version 0.11.2, an authorization bypass in the LFS lock deletion endpoint allows any authenticated user with repository write access to delete locks owned by other users by setting the force flag. The vulnerable code path processes force deletions before retrieving user context, bypassing ownership validation entirely. This issue has been patched in version 0.11.2.
AI-Powered Analysis
Technical Analysis
CVE-2026-22253 is a medium-severity authorization bypass vulnerability identified in charmbracelet's Soft Serve, a self-hosted Git server primarily used via command line. The flaw exists in versions prior to 0.11.2 within the Large File Storage (LFS) lock deletion endpoint. Specifically, when an authenticated user with write permissions attempts to delete an LFS lock, the server processes requests with the 'force' flag before verifying the user's ownership of the lock. This sequence allows such users to delete locks owned by other users, bypassing intended authorization controls. The vulnerability stems from incorrect authorization logic (CWE-863), where the force deletion path does not properly validate user context before proceeding. While confidentiality is unaffected, the integrity and availability of repository locks can be compromised, potentially disrupting collaborative workflows or enabling denial of service on repository resources. Exploitation requires authenticated write access to the repository but no additional user interaction. The vulnerability was publicly disclosed on January 8, 2026, with no known exploits in the wild at the time of publication. The issue has been addressed in Soft Serve version 0.11.2, which corrects the authorization sequence to ensure ownership validation precedes any forced deletion operation.
Potential Impact
For European organizations utilizing Soft Serve for Git repository management, this vulnerability poses a risk to the integrity and availability of repository locks, which are critical for coordinating concurrent file edits in large file storage scenarios. Unauthorized deletion of LFS locks by users with write access can lead to conflicts, data corruption, or workflow disruptions, potentially delaying development cycles or causing accidental overwrites. While the breach does not expose confidential data, the disruption to development processes can have operational and reputational consequences, especially for organizations relying on strict version control and collaboration protocols. The requirement for authenticated write access limits the attack surface to internal or trusted users, but insider threats or compromised credentials could be leveraged to exploit this vulnerability. Given the increasing adoption of self-hosted Git solutions in European tech sectors, failure to patch could impact software development integrity and availability.
Mitigation Recommendations
European organizations should immediately upgrade all Soft Serve instances to version 0.11.2 or later, where the authorization bypass has been fixed. Until upgrades are completed, organizations should restrict repository write access to trusted users only and monitor LFS lock deletion activities for anomalies, such as unexpected forced deletions. Implementing enhanced logging and alerting on repository lock operations can help detect potential exploitation attempts. Additionally, organizations should enforce strong authentication mechanisms and credential hygiene to reduce the risk of compromised accounts being used to exploit this vulnerability. Regular audits of repository permissions and user roles will further minimize exposure. Where feasible, consider isolating critical repositories or employing additional access controls to limit the impact of potential misuse of write privileges.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-07T05:19:12.921Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695ffd5601d35e5d0c85d737
Added to database: 1/8/2026, 6:54:14 PM
Last enriched: 1/8/2026, 7:09:08 PM
Last updated: 1/9/2026, 1:17:37 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66052: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Vivotek IP7137
High‘ZombieAgent’ Attack Let Researchers Take Over ChatGPT
MediumCVE-2025-14598: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in BeeS Software Solutions BET ePortal
Unknown377,000 Impacted by Data Breach at Texas Gas Station Firm
MediumCVE-2025-66051: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Vivotek IP7137
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.