Cyber Posture

CVE-2021-47874

HighPublic PoC

Published: 21 January 2026

Published
21 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 4.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2021-47874 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Vfsforgit (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-2 (Baseline Configuration) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 mandates identification, reporting, and correction of flaws like unquoted service paths via patching or reconfiguration, directly preventing exploitation of CVE-2021-47874.

prevent

CM-6 requires establishing and enforcing secure configuration settings for system components, including quoted binary paths for services to block PATH hijacking.

prevent

CM-2 ensures a secure baseline configuration is developed and maintained, incorporating proper service path quoting to mitigate unquoted path vulnerabilities.

NVD Description

VFS for Git 1.0.21014.1 contains an unquoted service path vulnerability in the GVFS.Service Windows service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched…

more

with LocalSystem privileges during service startup or system reboot.

Deeper analysisAI

CVE-2021-47874 is an unquoted service path vulnerability (CWE-428) in VFS for Git version 1.0.21014.1, affecting the GVFS.Service Windows service. The issue stems from an unquoted binary path in the service configuration, which allows local attackers to execute arbitrary code with elevated privileges by injecting malicious executables into the system's search path.

A local attacker with low privileges (AV:L/AC:L/PR:L) can exploit this vulnerability by placing a malicious executable in a directory that precedes the legitimate service binary in the Windows PATH environment. Upon GVFS.Service startup or system reboot, the malicious binary executes with LocalSystem privileges, granting high impacts on confidentiality, integrity, and availability (CVSS:3.1 score of 7.8; C:H/I:H/A:H).

Advisories and references include the official VFS for Git site (https://vfsforgit.org/), a VulnCheck advisory on the GVFS.Service unquoted path issue (https://www.vulncheck.com/advisories/vfs-for-git-gvfsservice-unquoted-service-path), and a public exploit on Exploit-DB (https://www.exploit-db.com/exploits/49661), highlighting the need for patching or service reconfiguration to mitigate local privilege escalation risks.

Details

CWE(s)

Affected Products

Vfsforgit
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2019-25276Shared CWE-428
CVE-2020-37098Shared CWE-428
CVE-2021-47809Shared CWE-428
CVE-2024-57276Shared CWE-428
CVE-2020-37100Shared CWE-428
CVE-2021-47790Shared CWE-428
CVE-2020-36976Shared CWE-428
CVE-2021-47787Shared CWE-428
CVE-2021-47833Shared CWE-428
CVE-2021-47861Shared CWE-428

References