CVE-2025-22165
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-24

Last updated on: 2025-07-30

Assigner: Atlassian

Description
This Medium severity ACE (Arbitrary Code Execution) vulnerability was introduced in version 4.2.8 of Sourcetree for Mac. This ACE (Arbitrary Code Execution) vulnerability, with a CVSS Score of 5.9, allows a locally authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.Β  Atlassian recommends that Sourcetree for Mac users upgrade to the latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://www.sourcetreeapp.com/download-archives . You can download the latest version of Sourcetree for Mac from the download center https://www.sourcetreeapp.com/download-archives . This vulnerability was found through the Atlassian Bug Bounty Program by Karol Mazurek (AFINE).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-24
Last Modified
2025-07-30
Generated
2026-05-07
AI Q&A
2025-07-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
atlassian sourcetree From 4.2.8 (inc) to 4.2.12 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Arbitrary Code Execution (ACE) flaw in Sourcetree for Mac, introduced in version 4.2.8. It allows a locally authenticated attacker to execute arbitrary code on the affected system, requiring user interaction. The vulnerability has a medium severity with a CVSS score of 5.9 and impacts confidentiality, integrity, and availability highly.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker with local access and user interaction to execute arbitrary code, potentially compromising the confidentiality, integrity, and availability of your system or data. This could lead to unauthorized access, data modification, or system disruption.


What immediate steps should I take to mitigate this vulnerability?

Atlassian recommends that Sourcetree for Mac users upgrade to the latest version or to one of the specified supported fixed versions. If upgrading immediately is not possible, refer to the release notes at https://www.sourcetreeapp.com/download-archives for guidance on fixed versions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart