Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hffm-xvc3-vprc | simple-git is vulnerable to Remote Code Execution |
Wed, 06 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Residual Command Injection via Incomplete Sanitization of --config in simple‑git Pre‑3.36.0 | simple-git: simple-git: Remote Code Execution due to incomplete fix bypass |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 28 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Residual Command Injection via Incomplete Sanitization of --config in simple‑git Pre‑3.36.0 |
Mon, 27 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Steveukx
Steveukx simple-git |
|
| Vendors & Products |
Steveukx
Steveukx simple-git |
Sat, 25 Apr 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 25 Apr 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source. | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-04-25T10:50:22.342Z
Reserved: 2026-04-24T07:25:39.128Z
Link: CVE-2026-6951
Updated: 2026-04-25T10:49:36.870Z
Status : Awaiting Analysis
Published: 2026-04-25T06:16:16.453
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-6951
OpenCVE Enrichment
Updated: 2026-05-06T01:30:15Z
Github GHSA