CVE-2025-53107
BaseFortify
Publication date: 2025-07-01
Last updated on: 2025-07-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
@cyanheads/git-mcp-server versions prior to 2.1.5 have a command injection vulnerability. This occurs because the server uses unsanitized user input directly in shell commands executed via child_process.exec. An attacker can exploit this by injecting arbitrary system commands through specially crafted input, leading to remote code execution with the server process's privileges. The vulnerability involves shell metacharacter injection such as |, >, &&, etc.
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker to execute arbitrary system commands remotely on the server running the vulnerable software. This can lead to full compromise of the server process, including unauthorized access, data manipulation, or disruption of service.
What immediate steps should I take to mitigate this vulnerability?
Upgrade @cyanheads/git-mcp-server to version 2.1.5 or later, where the command injection vulnerability has been patched. Until the upgrade can be applied, restrict access to the server to trusted users only and monitor for any suspicious activity involving shell command execution.