CVE-2025-46835

EUVD-2025-21002
Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
Argument Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.5 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
GitHub_MCNA
8.5 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
Debian logo
Debian Releases
Debian Product
Codename
git
bookworm
no-dsa
bookworm (security)
vulnerable
bullseye
vulnerable
bullseye (security)
1:2.30.2-1+deb11u5
fixed
forky
1:2.51.0-1
fixed
sid
1:2.53.0-1
fixed
trixie
1:2.47.3-0+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
git
bionic
Fixed 1:2.17.1-1ubuntu0.18+esm4
released
focal
Fixed 1:2.25.1-1ubuntu3.14+esm3
released
jammy
Fixed 1:2.34.1-1ubuntu1.15
released
noble
Fixed 1:2.43.0-1ubuntu7.3
released
oracular
Fixed 1:2.45.2-1ubuntu1.2
released
plucky
Fixed 1:2.48.1-0ubuntu1.1
released
xenial
Fixed 1:2.7.4-0ubuntu1.10+esm11
released