๐Ÿ” CVE Alert

CVE-2026-28291

HIGH 8.1

simple-git has Command Execution via Option-Parsing Bypass

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

simple-git enables running native Git commands from JavaScript. Versions up to and including 3.31.1 allow execution of arbitrary commands through Git option manipulation, bypassing safety checks meant to block dangerous options like -u and --upload-pack. The flaw stems from an incomplete fix for CVE-2022-25860, as Git's flexible option parsing allows numerous character combinations (e.g., -vu, -4u, -nu) to circumvent the regular-expression-based blocklist in the unsafe operations plugin. Due to the virtually infinite number of valid option variants that Git accepts, a complete blocklist-based mitigation may be infeasible without fully emulating Git's option parsing behavior. This issue has been fixed in version 3.32.0.

CWE CWE-78
Vendor steveukx
Product git-js
Published Apr 13, 2026
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for steveukx git-js

Be the first to know when new high vulnerabilities affecting steveukx git-js are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

steveukx / git-js
< 3.32.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/steveukx/git-js/security/advisories/GHSA-jcxm-m3jx-f287 github.com: https://github.com/steveukx/git-js/commit/1effd8e5012a5da05a9776512fac3e39b11f2d2d github.com: https://github.com/steveukx/git-js/blob/789c13ebabcf18ebe0b3a0c88ebb4037dede42e3/simple-git/src/lib/plugins/block-unsafe-operations-plugin.ts#L26 github.com: https://github.com/steveukx/git-js/releases/tag/simple-git%403.32.0 cve.org: https://www.cve.org/CVERecord?id=CVE-2022-25860