However, the library follows these conventions which can be abused:
1. It trusts branch names as they are (plain text)
2. It spawns git commands by concatenating user input
Since a branch name is potentially a user input - as users can create branches remotely via pull requests, or simply due to privileged access to a repository - it can effectively be abused to run any command.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31701 | check-branches is vulnerable to command Injection |
Github GHSA |
GHSA-9c4g-fp4r-prrv | check-branches is vulnerable to command Injection |
Thu, 02 Oct 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Check-branches Project
Check-branches Project check-branches |
|
| Vendors & Products |
Check-branches Project
Check-branches Project check-branches |
Tue, 30 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package check-branches are vulnerable to Command Injection check-branches is a command-line tool that is interacted with locally, or via CI, to confirm no conflicts exist in git branches. However, the library follows these conventions which can be abused: 1. It trusts branch names as they are (plain text) 2. It spawns git commands by concatenating user input Since a branch name is potentially a user input - as users can create branches remotely via pull requests, or simply due to privileged access to a repository - it can effectively be abused to run any command. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-09-30T19:06:21.373Z
Reserved: 2025-09-29T09:12:03.488Z
Link: CVE-2025-11148
Updated: 2025-09-30T19:06:12.881Z
Status : Deferred
Published: 2025-09-30T11:37:38.883
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11148
No data.
OpenCVE Enrichment
Updated: 2025-10-02T08:46:24Z
EUVD
Github GHSA