CVE-2025-22130
Published: 08 January 2025
Summary
CVE-2025-22130 is a high-severity Path Traversal (CWE-22) vulnerability in Charm Soft Serve. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 38.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates user-supplied repository path inputs to prevent traversal sequences that allow non-admin users to access unauthorized repositories.
Enforces approved authorizations for access to repository resources, blocking path traversal attempts by non-admin users.
Requires timely identification, reporting, and correction of flaws like this path traversal vulnerability via patching to version 0.8.2.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing Git server directly enables remote exploitation by low-priv users to achieve unauthorized repo access/modification and administrative control (privilege escalation).
NVD Description
Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily…
more
repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2.
Deeper analysisAI
CVE-2025-22130 is a path traversal vulnerability (CWE-22) in Soft Serve, a self-hostable Git server designed for command-line use. Versions prior to 0.8.2 are affected, where the flaw enables unauthorized access to repository paths. Published on January 8, 2025, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
The vulnerability can be exploited by existing non-administrative users over the network with low attack complexity and no user interaction required. Attackers with low privileges can traverse paths to access, take over, modify, delete, or arbitrarily manage other users' repositories, effectively gaining administrative-like control without explicit permissions.
Mitigation is available in Soft Serve version 0.8.2, which patches the issue. Administrators should upgrade immediately. Key resources include the fixing commit at https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4, release notes at https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2, and the GitHub security advisory at https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c.
Details
- CWE(s)