CVE-2026-32631
Git for Windows: `git clone` from manipulated repositories can leak NTLM hashes to arbitrary servers
CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
0th
Git for Windows is the Windows port of Git. Versions prior to 2.53.0.windows.3 do not have protections that prevent attackers from obtaining a user's NTLM hash. The NTLM hash can be obtained by tricking users into cloning a malicious repository, or checking out a malicious branch, that accesses an attacker-controlled server. By default, NTLM authentication does not need any user interaction. By brute-forcing the NTLMv2 hash (which is expensive, but possible), credentials can be extracted. This issue has been fixed in version 2.53.0.windows.3.
| CWE | CWE-200 |
| Vendor | git-for-windows |
| Product | git |
| Published | Apr 15, 2026 |
| Last Updated | Apr 15, 2026 |
Stay Ahead of the Next One
Get instant alerts for git-for-windows git
Be the first to know when new high vulnerabilities affecting git-for-windows git are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
git-for-windows / git
< 2.53.0.windows.3
References
github.com: https://github.com/git-for-windows/git/security/advisories/GHSA-9j5h-h4m7-85hx github.com: https://github.com/git-for-windows/git/releases/tag/v2.53.0.windows.3 learn.microsoft.com: https://learn.microsoft.com/en-au/windows/whats-new/deprecated-features#:~:text=NTLM support.microsoft.com: https://support.microsoft.com/en-us/topic/upcoming-changes-to-ntlmv1-in-windows-11-version-24h2-and-windows-server-2025-c0554217-cdbc-420f-b47c-e02b2db49b2e techcommunity.microsoft.com: https://techcommunity.microsoft.com/blog/windows-itpro-blog/the-evolution-of-windows-authentication/3926848