Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2025-27613 CVE-2025-46334 CVE-2025-46835 |
CWE-ID | CWE-693 CWE-426 CWE-356 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system perl-Git-SVN Operating systems & Components / Operating system package or component perl-Git Operating systems & Components / Operating system package or component gitk Operating systems & Components / Operating system package or component git-web Operating systems & Components / Operating system package or component git-svn Operating systems & Components / Operating system package or component git-help Operating systems & Components / Operating system package or component git-gui Operating systems & Components / Operating system package or component git-email Operating systems & Components / Operating system package or component git-debugsource Operating systems & Components / Operating system package or component git-debuginfo Operating systems & Components / Operating system package or component git-daemon Operating systems & Components / Operating system package or component git-core Operating systems & Components / Operating system package or component git Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU112642
Risk: High
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-27613
CWE-ID:
CWE-693 - Protection Mechanism Failure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists in Gitk when cloning an untrusted repository and executing Gitk without additional command arguments. A remote attacker can abuse such behavior and overwrite or truncate any files on the system.
Successful exploitation of the vulnerability requires that the "Support per-file encoding" option is enabled.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
perl-Git-SVN: before 2.33.0-19
perl-Git: before 2.33.0-19
gitk: before 2.33.0-19
git-web: before 2.33.0-19
git-svn: before 2.33.0-19
git-help: before 2.33.0-19
git-gui: before 2.33.0-19
git-email: before 2.33.0-19
git-debugsource: before 2.33.0-19
git-debuginfo: before 2.33.0-19
git-daemon: before 2.33.0-19
git-core: before 2.33.0-19
git: before 2.33.0-19
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1849
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112644
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-46334
CWE-ID:
CWE-426 - Untrusted Search Path
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to usage of an untrusted search path in Git GUI on Windows. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. On Windows, path lookup can find such executables in the worktree. These programs are invoked when the user selects "Git Bash" or "Browse Files" from the menu.
Note, the vulnerability affects Windows installations only.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
perl-Git-SVN: before 2.33.0-19
perl-Git: before 2.33.0-19
gitk: before 2.33.0-19
git-web: before 2.33.0-19
git-svn: before 2.33.0-19
git-help: before 2.33.0-19
git-gui: before 2.33.0-19
git-email: before 2.33.0-19
git-debugsource: before 2.33.0-19
git-debuginfo: before 2.33.0-19
git-daemon: before 2.33.0-19
git-core: before 2.33.0-19
git: before 2.33.0-19
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1849
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112646
Risk: Medium
CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-46835
CWE-ID:
CWE-356 - Product UI does not Warn User of Unsafe Actions
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing notifications in Git GUI when performing potentially dangerous actions. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite any writable file.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP3
perl-Git-SVN: before 2.33.0-19
perl-Git: before 2.33.0-19
gitk: before 2.33.0-19
git-web: before 2.33.0-19
git-svn: before 2.33.0-19
git-help: before 2.33.0-19
git-gui: before 2.33.0-19
git-email: before 2.33.0-19
git-debugsource: before 2.33.0-19
git-debuginfo: before 2.33.0-19
git-daemon: before 2.33.0-19
git-core: before 2.33.0-19
git: before 2.33.0-19
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1849
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.