CVE-2025-52483

Registrator is a GitHub app that automates creation of registration pull requests for julia packages to the General registry. Prior to version 1.9.5, if the clone URL returned by GitHub is malicious (or can be injected using upstream vulnerabilities) a shell script injection can occur within the `withpasswd` function. Alternatively, an argument injection is possible in the `gettreesha `function. either of these can then lead to a potential RCE. Users should upgrade immediately to v1.9.5 to receive a fix. All prior versions are vulnerable. No known workarounds are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:julialang:registrator:*:*:*:*:*:julia:*:*

History

19 Sep 2025, 16:01

Type Values Removed Values Added
First Time Julialang registrator
Julialang
CPE cpe:2.3:a:julialang:registrator:*:*:*:*:*:julia:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/JuliaRegistries/Registrator.jl/pull/448 - () https://github.com/JuliaRegistries/Registrator.jl/pull/448 - Issue Tracking, Patch
References () https://github.com/JuliaRegistries/Registrator.jl/security/advisories/GHSA-589r-g8hf-xx59 - () https://github.com/JuliaRegistries/Registrator.jl/security/advisories/GHSA-589r-g8hf-xx59 - Vendor Advisory, Issue Tracking

26 Jun 2025, 18:57

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-25 17:15

Updated : 2025-09-19 16:01


NVD link : CVE-2025-52483

Mitre link : CVE-2025-52483

CVE.ORG link : CVE-2025-52483


JSON object : View

Products Affected

julialang

  • registrator
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')