We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54586

GitProxy is susceptible to a hidden commits injection attack



Description

GitProxy is an application that stands between developers and a Git remote endpoint. In versions 1.19.1 and below, attackers can inject extra commits into the pack sent to GitHub, commits that aren’t pointed to by any branch. Although these “hidden” commits never show up in the repository’s visible history, GitHub still serves them at their direct commit URLs. This lets an attacker exfiltrate sensitive data without ever leaving a trace in the branch view. We rate this a High‑impact vulnerability because it completely compromises repository confidentiality. This is fixed in version 1.19.2.

Reserved 2025-07-25 | Published 2025-07-30 | Updated 2025-07-30 | Assigner GitHub_M


HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 1.19.2
affected

References

github.com/...-proxy/security/advisories/GHSA-v98g-8rqx-g93g

github.com/...ommit/9c1449f4ec37d2d1f3edf4328bc3757e8dba2110

github.com/...ommit/a620a2f33c39c78e01783a274580bf822af3cc3a

github.com/finos/git-proxy/releases/tag/v1.19.2

cve.org (CVE-2025-54586)

nvd.nist.gov (CVE-2025-54586)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54586

Support options

Helpdesk Chat, Email, Knowledgebase