Vulnerability Description
go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not properly verified. This resulted in go-git potentially consuming corrupted files, which would likely result in unexpected errors such as object not found. For context, clients fetch packfiles from upstream Git servers. Those files contain a checksum of their contents, so that clients can perform integrity checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when new .pack files are received and processed. The integrity checks for both files were not being verified correctly. This vulnerability is fixed in 5.16.5.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Go-Git Project | Go-Git | < 5.16.5 |
Related Weaknesses (CWE)
References
- https://github.com/go-git/go-git/releases/tag/v5.16.5ProductRelease Notes
- https://github.com/go-git/go-git/security/advisories/GHSA-37cx-329c-33x3PatchVendor Advisory
FAQ
What is CVE-2026-25934?
CVE-2026-25934 is a vulnerability with a CVSS score of 4.3 (MEDIUM). go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not p...
How severe is CVE-2026-25934?
CVE-2026-25934 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25934?
Check the references section above for vendor advisories and patch information. Affected products include: Go-Git Project Go-Git.