๐Ÿ” CVE Alert

CVE-2026-42215

HIGH 8.8

GitPython: Command injection via Git options bypass

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

GitPython is a python library used to interact with Git repositories. From version 3.1.30 to before version 3.1.47, GitPython blocks dangerous Git options such as --upload-pack and --receive-pack by default, but the equivalent Python kwargs upload_pack and receive_pack bypass that check. If an application passes attacker-controlled kwargs into Repo.clone_from(), Remote.fetch(), Remote.pull(), or Remote.push(), this leads to arbitrary command execution even when allow_unsafe_options is left at its default value of False. This issue has been patched in version 3.1.47.

CWE CWE-78
Vendor gitpython-developers
Product gitpython
Published May 7, 2026
Stay Ahead of the Next One

Get instant alerts for gitpython-developers gitpython

Be the first to know when new high vulnerabilities affecting gitpython-developers gitpython are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

gitpython-developers / GitPython
>= 3.1.30, < 3.1.47

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-rpm5-65cw-6hj4 github.com: https://github.com/gitpython-developers/GitPython/releases/tag/3.1.47