CVE-2025-21613
Published: 06 January 2025
Summary
CVE-2025-21613 is a critical-severity Argument Injection (CWE-88) vulnerability in Go-Git Project Go-Git. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 13.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the argument injection flaw in go-git by updating to version 5.13.0 or later, directly eliminating the vulnerability.
Implements input validation mechanisms to sanitize arguments before they are passed to git-upload-pack, countering the injection vulnerability.
Provides vulnerability scanning to identify systems using vulnerable go-git versions prior to v5.13, enabling proactive patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated argument injection in a Git library directly enables exploitation of public-facing apps (T1190) and client-side execution via injected Git flags (T1203).
NVD Description
go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags.…
more
This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.
Deeper analysisAI
CVE-2025-21613 is an argument injection vulnerability (CWE-88) in go-git, a highly extensible Git implementation library written in pure Go. The flaw affects versions prior to v5.13 and occurs only when the file transport protocol is used, as this is the sole protocol that shells out to Git binaries, enabling the injection.
A remote network attacker requires no privileges, authentication, or user interaction and faces low attack complexity, per the CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation allows the attacker to set arbitrary values to git-upload-pack flags, resulting in high impacts to confidentiality, integrity, and availability.
The vulnerability is addressed in go-git v5.13.0. Additional details are available in the GitHub security advisory at https://github.com/go-git/go-git/security/advisories/GHSA-v725-9546-7q7m.
Details
- CWE(s)