Cyber Posture

CVE-2026-42284

HighPublic PoC

Published: 07 May 2026

Published
07 May 2026
Modified
08 May 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 13.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-42284 is a high-severity Argument Injection (CWE-88) vulnerability in Gitpython Project Gitpython. Its CVSS base score is 8.1 (High).

Operationally, ranked at the 13.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

NVD Description

GitPython is a python library used to interact with Git repositories. Prior to version 3.1.47, _clone() validates multi_options as the original list, then executes shlex.split(" ".join(multi_options)). A string like "--branch main --config core.hooksPath=/x" passes validation (starts with --branch), but after…

more

split becomes ["--branch", "main", "--config", "core.hooksPath=/x"]. Git applies the config and executes attacker hooks during clone. This issue has been patched in version 3.1.47.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

gitpython project
gitpython
≤ 3.1.47

CVEs Like This One

CVE-2026-44243Same product: Gitpython Project Gitpython
CVE-2026-26194Shared CWE-88
CVE-2026-22582Shared CWE-88
CVE-2026-40113Shared CWE-88
CVE-2025-41761Shared CWE-88
CVE-2026-25134Shared CWE-88
CVE-2026-2298Shared CWE-88
CVE-2026-24061Shared CWE-88
CVE-2026-24126Shared CWE-88
CVE-2025-0065Shared CWE-88

References