Home

Description

willitmerge is a command line tool to check if pull requests are mergeable. In versions 0.2.1 and prior, there is a command Injection vulnerability in willitmerge. The vulnerability manifests in this package due to the use of insecure child process execution API (exec) to which it concatenates user input, whether provided to the command-line flag, or is in user control in the target repository. At time of publication, no known fix is public.

PUBLISHED Reserved 2025-11-24 | Published 2025-11-29 | Updated 2025-12-01 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

<= 0.2.1
affected

References

github.com/...tmerge/security/advisories/GHSA-j9wj-m24m-7jj6 exploit

github.com/...tmerge/security/advisories/GHSA-j9wj-m24m-7jj6

github.com/...05ac6da685828d109a3a5885028/lib/willitmerge.js

cve.org (CVE-2025-66219)

nvd.nist.gov (CVE-2025-66219)

Download JSON