Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6799 | Prototype Pollution Vulnerability in parse-git-config |
Github GHSA |
GHSA-8g77-54rh-46hx | Prototype Pollution Vulnerability in parse-git-config |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 02 Apr 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jonschlinkert
Jonschlinkert parse-git-config |
|
| CPEs | cpe:2.3:a:jonschlinkert:parse-git-config:3.0.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Jonschlinkert
Jonschlinkert parse-git-config |
Wed, 19 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
ssvc
|
Fri, 14 Mar 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | parse-git-config: Prototype Pollution Vulneralbility in parse-git-config | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 12 Mar 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in parse-git-config v.3.0.0 allows an attacker to obtain sensitive information via the expandKeys function | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-19T18:51:42.398Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-25975
Updated: 2025-03-19T18:51:38.146Z
Status : Analyzed
Published: 2025-03-12T19:15:40.147
Modified: 2025-04-02T20:34:36.553
Link: CVE-2025-25975
OpenCVE Enrichment
No data.
EUVD
Github GHSA