Exploitation of Git Vulnerability CVE-2025-48384
Successful exploitation could allow a remote attacker to execute arbitrary code upon cloning a Git repository
Summary
Successful exploitation could allow a remote attacker to execute arbitrary code upon cloning a Git repository
Affected platforms
The following platforms are known to be affected:
Threat details
Exploitation of CVE-2025-48384
CVE-2025-48384 has been observed being exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog. The NHS England National CSOC assesses further exploitation as likely.
Introduction
In July, a security update for Git was released to address a high severity arbitrary code execution vulnerability (CVE-2025-48384). The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-48384 to the Known Exploited Vulnerabilities (KEV) Catalog.
- CVE-2025-48384 - Git Allows Arbitrary Code Execution Through Broken Config Quoting - CVSSv3 score: 8.1
Remediation advice
Affected organisations are encouraged to review GHSA-vwqx-4fm8-6qc9 for a list of fixed versions, and apply the relevant updates as soon as possible.
Definitive source of threat updates
Last edited: 27 August 2025 1:59 pm