CVE-2022-25860

Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
Configurations

Configuration 1 (hide)

cpe:2.3:a:simple-git_project:simple-git:*:*:*:*:*:node.js:*:*

History

01 Apr 2025, 16:15

Type Values Removed Values Added
CWE CWE-78

Information

Published : 2023-01-26 21:15

Updated : 2025-04-01 16:15


NVD link : CVE-2022-25860

Mitre link : CVE-2022-25860

CVE.ORG link : CVE-2022-25860


JSON object : View

Products Affected

simple-git_project

  • simple-git
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

NVD-CWE-noinfo CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')