Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.
Metrics
Affected Vendors & Products
References
History
Mon, 27 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Steveukx
Steveukx simple-git |
|
| Vendors & Products |
Steveukx
Steveukx simple-git |
Sat, 25 Apr 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 25 Apr 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source. | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published: 2026-04-25T05:00:05.257Z
Updated: 2026-04-25T10:50:22.342Z
Reserved: 2026-04-24T07:25:39.128Z
Link: CVE-2026-6951
Updated: 2026-04-25T10:49:36.870Z
Status : Awaiting Analysis
Published: 2026-04-25T06:16:16.453
Modified: 2026-04-27T18:57:20.293
Link: CVE-2026-6951
No data.
ReportizFlow