- Description
- Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
- Source
- security-advisories@github.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.5
- Impact score
- 6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
- Severity
- HIGH
- security-advisories@github.com
- CWE-88
- Hype score
- Not currently trending
CVE-2025-46835 Git GUI Arbitrary File Overwrite via Malicious Repository... https://t.co/TRNULN5xg8 Don't wait vulnerability scanning results: https://t.co/oh1APvMMnd
@VulmonFeeds
10 Jul 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-46835: HIGH] Git GUI fixed a vulnerability in versions starting from 2.43.7 - 2.50.1 that could allow a malicious repository to create/overwrite files on the user's system.#cve,CVE-2025-46835,#cybersecurity https://t.co/R0ey69CvWM https://t.co/Kic0MrO7Rq
@CveFindCom
10 Jul 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes