Browse all 4 CVE security advisories affecting GitoxideLabs. AI-powered Chinese analysis, POCs, and references for each vulnerability.
GitoxideLabs develops the gitoxide toolkit, a Rust implementation of Git with command-line and library interfaces. Historically, their vulnerabilities have included remote code execution flaws in repository parsing, cross-site scripting in web interfaces, and privilege escalation through unsafe path handling. The project maintains a security-focused approach with regular audits and a vulnerability disclosure policy. While no major public incidents have been reported, their four CVEs highlight risks in handling untrusted Git data, particularly in parsing and rendering components. The project's Rust foundation provides memory safety advantages over traditional C-based Git implementations, though complex parsing logic remains a potential attack surface.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-0810 | Gix-date: gix-date: undefined behavior due to invalid string generation — gitoxideCWE-135 | 7.1 | High | 2026-01-26 |
| CVE-2025-31130 | gitoxide does not detect SHA-1 collision attacks — gitoxideCWE-328 | 6.8 | Medium | 2025-04-04 |
| CVE-2025-22620 | gix-worktree-state nonexclusive checkout sets executable files world-writable — gitoxideCWE-281 | 5.0 | Medium | 2025-01-20 |
This page lists every published CVE security advisory associated with GitoxideLabs. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.