Vulnerability Description
Git for Windows is the Windows port of Git. Prior to 2.53.0(2), it is possible to obtain a user's NTLM hash by tricking them into cloning from a malicious server. Since NTLM hashing is weak, it is possible for the attacker to brute-force the user's account name and password. This vulnerability is fixed in 2.53.0(2).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitforwindows | Git | <= 2.53.0 |
Related Weaknesses (CWE)
References
- https://github.com/git-for-windows/git/releases/tag/v2.53.0.windows.2Release Notes
- https://github.com/git-for-windows/git/security/advisories/GHSA-hv9c-4jm9-jh3xExploitVendor Advisory
FAQ
What is CVE-2025-66413?
CVE-2025-66413 is a vulnerability with a CVSS score of 7.4 (HIGH). Git for Windows is the Windows port of Git. Prior to 2.53.0(2), it is possible to obtain a user's NTLM hash by tricking them into cloning from a malicious server. Since NTLM hashing is weak, it is pos...
How severe is CVE-2025-66413?
CVE-2025-66413 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-66413?
Check the references section above for vendor advisories and patch information. Affected products include: Gitforwindows Git.