Vulnerability Description
GitPython is a python library used to interact with Git repositories. From version 3.1.30 to before version 3.1.47, GitPython blocks dangerous Git options such as --upload-pack and --receive-pack by default, but the equivalent Python kwargs upload_pack and receive_pack bypass that check. If an application passes attacker-controlled kwargs into Repo.clone_from(), Remote.fetch(), Remote.pull(), or Remote.push(), this leads to arbitrary command execution even when allow_unsafe_options is left at its default value of False. This issue has been patched in version 3.1.47.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitpython Project | Gitpython | >= 3.1.30, < 3.1.47 |
Related Weaknesses (CWE)
References
- https://github.com/gitpython-developers/GitPython/releases/tag/3.1.47PatchRelease Notes
- https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-rpm5-ExploitVendor Advisory
- https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-rpm5-ExploitVendor Advisory
FAQ
What is CVE-2026-42215?
CVE-2026-42215 is a vulnerability with a CVSS score of 8.8 (HIGH). GitPython is a python library used to interact with Git repositories. From version 3.1.30 to before version 3.1.47, GitPython blocks dangerous Git options such as --upload-pack and --receive-pack by d...
How severe is CVE-2026-42215?
CVE-2026-42215 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42215?
Check the references section above for vendor advisories and patch information. Affected products include: Gitpython Project Gitpython.