Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-48384— Git allows arbitrary code execution through broken config quoting

CVSS 8.1 · High KEV EPSS 0.60% · P70
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-48384

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Git allows arbitrary code execution through broken config quoting
Source: NVD (National Vulnerability Database)
Vulnerability Description
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
解释冲突
Source: NVD (National Vulnerability Database)
Vulnerability Title
Git 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Git是Git开源的一套免费、开源的分布式版本控制系统。 Git存在安全漏洞,该漏洞源于在处理配置值时尾随回车符的处理不当,可能使子模块被错误检出到由符号链接指向的钩子目录,意外执行其中的可执行脚本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
gitgit < 2.43.7 -

II. Public POCs for CVE-2025-48384

#POC DescriptionSource LinkShenlong Link
1Breaking git with a carriage return and cloning RCEhttps://github.com/acheong08/CVE-2025-48384POC Details
2for CVE-2025-48384 testhttps://github.com/fishyyh/CVE-2025-48384POC Details
3Nonehttps://github.com/kallydev/cve-2025-48384-hookPOC Details
4Nonehttps://github.com/fishyyh/CVE-2025-48384-POCPOC Details
5Nonehttps://github.com/liamg/CVE-2025-48384-submodulePOC Details
6PoC for CVE-2025-48384https://github.com/liamg/CVE-2025-48384POC Details
7Nonehttps://github.com/ppd520/CVE-2025-48384POC Details
8漏洞测试https://github.com/NigelX/CVE-2025-48384POC Details
9Nonehttps://github.com/greatyy/CVE-2025-48384-pPOC Details
10CVE-2025-48384https://github.com/testdjshan/CVE-2025-48384POC Details
11Nonehttps://github.com/altm4n/cve-2025-48384POC Details
12Nonehttps://github.com/altm4n/cve-2025-48384-hubPOC Details
13Nonehttps://github.com/p1026/CVE-2025-48384POC Details
14PoC dockerfile image for CVE-2025-48384https://github.com/vinieger/vinieger-CVE-2025-48384-DockerfilePOC Details
15Nonehttps://github.com/ECHO6789/CVE-2025-48384-submodulePOC Details
16Nonehttps://github.com/nguyentranbaotran/cve-2025-48384-pocPOC Details
17Nonehttps://github.com/admin-ping/CVE-2025-48384-RCEPOC Details
18Nonehttps://github.com/simplyfurious/CVE-2025-48384-submodule_testPOC Details
19Nonehttps://github.com/Anezatraa/CVE-2025-48384-submodulePOC Details
20CVE-2025-48384 PoChttps://github.com/IK-20211125/CVE-2025-48384POC Details
21Nonehttps://github.com/elprogramadorgt/CVE-2025-48384POC Details
22Nonehttps://github.com/rtefx/CVE-2025-48384POC Details
23test for CVE-2025-48384https://github.com/f1shh/CVE-2025-48384POC Details
24PoC for CVE-2025-48384https://github.com/fluoworite/CVE-2025-48384POC Details
25Nonehttps://github.com/fluoworite/CVE-2025-48384-subPOC Details
26Nonehttps://github.com/beishanxueyuan/CVE-2025-48384POC Details
27Nonehttps://github.com/beishanxueyuan/CVE-2025-48384-testPOC Details
28Nonehttps://github.com/jideasn/cve-2025-48384POC Details
29Nonehttps://github.com/testtianmaaaa/CVE-2025-48384POC Details
30Nonehttps://github.com/replicatorbot/CVE-2025-48384POC Details
31Nonehttps://github.com/replicatorbot/CVE-2025-48384-POCPOC Details
32PoChttps://github.com/eliox01/CVE-2025-48384POC Details
33testhttps://github.com/wzx5002/CVE-2025-48384POC Details
34sub for CVE-2025-48384https://github.com/wzx5002/totallynotsuspiciousPOC Details
35Breaking git with a carriage return and cloning RCEhttps://github.com/butyraldehyde/CVE-2025-48384-PoCPOC Details
36RCE hookhttps://github.com/butyraldehyde/CVE-2025-48384-PoC-Part2POC Details
37PoC for CVE-2025-48384https://github.com/jacobholtz/CVE-2025-48384-pocPOC Details
38Nonehttps://github.com/jacobholtz/CVE-2025-48384-submodulePOC Details
39Nonehttps://github.com/arun1033/CVE-2025-48384POC Details
40CVE-2025-48384 Scannerhttps://github.com/EdwardYeIntrix/CVE-2025-48384-ScannerPOC Details
41GIT vulnerability | Carriage Return and RCE on cloninghttps://github.com/s41r4j/CVE-2025-48384POC Details
42CVE-2025-48384-submodulehttps://github.com/s41r4j/CVE-2025-48384-submodulePOC Details
43might delete laterhttps://github.com/airkewld/cve-2025-48384POC Details
44will delete laterhttps://github.com/airkewld/cve-2025-48384-submodulePOC Details
45Nonehttps://github.com/mukesh-610/cve-2025-48384-exploitPOC Details
46Nonehttps://github.com/mukesh-610/cve-2025-48384POC Details
47Nonehttps://github.com/MarcoTondolo/cve-2025-48384-pocPOC Details
48Nonehttps://github.com/zr0n/CVE-2025-48384-subPOC Details
49A proof of concept of remote code executionhttps://github.com/zr0n/CVE-2025-48384-mainPOC Details
50GIT vulnerability | Carriage Return and RCE on cloninghttps://github.com/vignesh21-git/CVE-2025-48384POC Details
51Testhttps://github.com/vignesh21-git/CVE-2025-48384-submodulePOC Details
52Superproject repo for Backup Exec CVE-2025-48384 exploithttps://github.com/DayDayDayDreaming/backup-exec-cve-48384POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-48384

登录查看更多情报信息。

Same Patch Batch · git · 2025-07-08 · 3 CVEs total

CVE-2025-483866.3 MEDIUMGit allows a buffer overflow in 'wincred' credential helper
CVE-2025-48385Git alllows arbitrary file writes via bundle-uri parameter injection

IV. Related Vulnerabilities

V. Comments for CVE-2025-48384

No comments yet


Leave a comment