CVE-2025-64494
BaseFortify
Publication date: 2025-11-08
Last updated on: 2025-11-12
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| charmbracelet | soft-serve | 0.10.0 |
| charmbracelet | soft-serve | 0.11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-150 | The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Soft Serve versions prior to 0.10.0, where user input such as names and git messages are not properly sanitized to remove ANSI escape sequences. These sequences can be exploited to display fake alerts or misleading information in the command line interface.
How can this vulnerability impact me? :
An attacker could use this vulnerability to inject ANSI escape sequences that display fake alerts or misleading messages, potentially causing confusion or tricking users into taking unintended actions. However, the impact is limited to information integrity and does not affect availability.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Soft Serve to version 0.10.0 or later, as this version fixes the issue by properly sanitizing user input and git messages to remove ANSI escape sequences.