CVE-2025-50178

GitForge.jl is a unified interface for interacting with Git "forges." Versions prior to 0.4.3 lack input validation for user provided values in certain functions. In the `GitForge.get_repo` function for GitHub, the user can provide any string for the owner and repo fields. These inputs are not validated or safely encoded and are sent directly to the server. This means a user can add path traversal patterns like `../` in the input to access any other endpoints on api.github.com that were not intended. Version 0.4.3 contains a patch for the issue. No known workarounds are available.
CVSS

No CVSS.

Configurations

No configuration.

History

26 Jun 2025, 18:57

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-25 16:15

Updated : 2025-06-26 18:57


NVD link : CVE-2025-50178

Mitre link : CVE-2025-50178

CVE.ORG link : CVE-2025-50178


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')