{"api_version":"1","generated_at":"2026-04-21T08:58:35+00:00","cve":"CVE-2022-25860","urls":{"html":"https://cve.report/CVE-2022-25860","api":"https://cve.report/api/cve/CVE-2022-25860.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-25860","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-25860"},"summary":{"title":"CVE-2022-25860","description":"Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).","state":"PUBLIC","assigner":"report@snyk.io","published_at":"2023-01-26 21:15:00","updated_at":"2023-11-07 03:44:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13","name":"https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13","refsource":"MISC","tags":[],"title":"Feat/unsafe pack by steveukx · Pull Request #881 · steveukx/git-js · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391","name":"https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391","refsource":"MISC","tags":[],"title":"Remote Code Execution (RCE) in simple-git | CVE-2022-25860 | Snyk","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951","name":"https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951","refsource":"MISC","tags":[],"title":"Block unsafe pack (push --exec) (#882) · steveukx/git-js@ec97a39 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-25860","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25860","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"25860","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"simple-git_project","cpe5":"simple-git","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-25860","ASSIGNER":"report@snyk.io","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221)."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Remote Code Execution (RCE)","cweId":"CWE-94"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"simple-git","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391","refsource":"MISC","name":"https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391"},{"url":"https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13","refsource":"MISC","name":"https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13"},{"url":"https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951","refsource":"MISC","name":"https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951"}]},"credits":[{"lang":"en","value":"Santos Gallegos"}],"impact":{"cvss":[{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P"}]}},"nvd":{"publishedDate":"2023-01-26 21:15:00","lastModifiedDate":"2023-11-07 03:44:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:simple-git_project:simple-git:*:*:*:*:*:node.js:*:*","versionEndExcluding":"3.16.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}