Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22253: CWE-863: Incorrect Authorization in charmbracelet soft-serve

0
Medium
VulnerabilityCVE-2026-22253cvecve-2026-22253cwe-863
Published: Thu Jan 08 2026 (01/08/2026, 18:39:57 UTC)
Source: CVE Database V5
Vendor/Project: charmbracelet
Product: soft-serve

Description

Soft Serve is a self-hostable Git server for the command line. Prior to version 0.11.2, an authorization bypass in the LFS lock deletion endpoint allows any authenticated user with repository write access to delete locks owned by other users by setting the force flag. The vulnerable code path processes force deletions before retrieving user context, bypassing ownership validation entirely. This issue has been patched in version 0.11.2.

AI-Powered Analysis

AILast updated: 01/08/2026, 19:09:08 UTC

Technical Analysis

CVE-2026-22253 is a medium-severity authorization bypass vulnerability identified in charmbracelet's Soft Serve, a self-hosted Git server primarily used via command line. The flaw exists in versions prior to 0.11.2 within the Large File Storage (LFS) lock deletion endpoint. Specifically, when an authenticated user with write permissions attempts to delete an LFS lock, the server processes requests with the 'force' flag before verifying the user's ownership of the lock. This sequence allows such users to delete locks owned by other users, bypassing intended authorization controls. The vulnerability stems from incorrect authorization logic (CWE-863), where the force deletion path does not properly validate user context before proceeding. While confidentiality is unaffected, the integrity and availability of repository locks can be compromised, potentially disrupting collaborative workflows or enabling denial of service on repository resources. Exploitation requires authenticated write access to the repository but no additional user interaction. The vulnerability was publicly disclosed on January 8, 2026, with no known exploits in the wild at the time of publication. The issue has been addressed in Soft Serve version 0.11.2, which corrects the authorization sequence to ensure ownership validation precedes any forced deletion operation.

Potential Impact

For European organizations utilizing Soft Serve for Git repository management, this vulnerability poses a risk to the integrity and availability of repository locks, which are critical for coordinating concurrent file edits in large file storage scenarios. Unauthorized deletion of LFS locks by users with write access can lead to conflicts, data corruption, or workflow disruptions, potentially delaying development cycles or causing accidental overwrites. While the breach does not expose confidential data, the disruption to development processes can have operational and reputational consequences, especially for organizations relying on strict version control and collaboration protocols. The requirement for authenticated write access limits the attack surface to internal or trusted users, but insider threats or compromised credentials could be leveraged to exploit this vulnerability. Given the increasing adoption of self-hosted Git solutions in European tech sectors, failure to patch could impact software development integrity and availability.

Mitigation Recommendations

European organizations should immediately upgrade all Soft Serve instances to version 0.11.2 or later, where the authorization bypass has been fixed. Until upgrades are completed, organizations should restrict repository write access to trusted users only and monitor LFS lock deletion activities for anomalies, such as unexpected forced deletions. Implementing enhanced logging and alerting on repository lock operations can help detect potential exploitation attempts. Additionally, organizations should enforce strong authentication mechanisms and credential hygiene to reduce the risk of compromised accounts being used to exploit this vulnerability. Regular audits of repository permissions and user roles will further minimize exposure. Where feasible, consider isolating critical repositories or employing additional access controls to limit the impact of potential misuse of write privileges.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-07T05:19:12.921Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695ffd5601d35e5d0c85d737

Added to database: 1/8/2026, 6:54:14 PM

Last enriched: 1/8/2026, 7:09:08 PM

Last updated: 1/9/2026, 1:17:37 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats