Skip to main content

Exploitation of Git Vulnerability CVE-2025-48384

Successful exploitation could allow a remote attacker to execute arbitrary code upon cloning a Git repository

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Successful exploitation could allow a remote attacker to execute arbitrary code upon cloning a Git repository


Affected platforms

The following platforms are known to be affected:

Threat details

Exploitation of CVE-2025-48384

CVE-2025-48384 has been observed being exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog. The NHS England National CSOC assesses further exploitation as likely.


Introduction

In July, a security update for Git was released to address a high severity arbitrary code execution vulnerability (CVE-2025-48384). The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-48384 to the Known Exploited Vulnerabilities (KEV) Catalog.

  • CVE-2025-48384 - Git Allows Arbitrary Code Execution Through Broken Config Quoting - CVSSv3 score: 8.1

Remediation advice

Affected organisations are encouraged to review GHSA-vwqx-4fm8-6qc9 for a list of fixed versions, and apply the relevant updates as soon as possible.



Last edited: 27 August 2025 1:59 pm