Vulnerability Description
Git GUI allows you to use the Git source control management tools via a GUI. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. Due to the unfortunate design of Tcl on Windows, the search path when looking for an executable always includes the current directory. The mentioned programs are invoked when the user selects Git Bash or Browse Files from the menu. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/j6t/git-gui/compare/dcda716dbc9c90bcac4611bd1076747671ee0906.
- https://github.com/j6t/git-gui/security/advisories/GHSA-7px4-9hg2-fvhx
- http://www.openwall.com/lists/oss-security/2025/07/08/4
FAQ
What is CVE-2025-46334?
CVE-2025-46334 is a vulnerability with a CVSS score of 8.6 (HIGH). Git GUI allows you to use the Git source control management tools via a GUI. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. Due to the unfo...
How severe is CVE-2025-46334?
CVE-2025-46334 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-46334?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.