CVE-2026-42284
Published: 07 May 2026
Summary
CVE-2026-42284 is a high-severity Argument Injection (CWE-88) vulnerability in Gitpython Project Gitpython. Its CVSS base score is 8.1 (High).
Operationally, ranked at the 13.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
NVD Description
GitPython is a python library used to interact with Git repositories. Prior to version 3.1.47, _clone() validates multi_options as the original list, then executes shlex.split(" ".join(multi_options)). A string like "--branch main --config core.hooksPath=/x" passes validation (starts with --branch), but after…
more
split becomes ["--branch", "main", "--config", "core.hooksPath=/x"]. Git applies the config and executes attacker hooks during clone. This issue has been patched in version 3.1.47.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)