← Back to CVEs
CVE-2025-50178
N/ADescription
GitForge.jl is a unified interface for interacting with Git "forges." Versions prior to 0.4.3 lack input validation for user provided values in certain functions. In the `GitForge.get_repo` function for GitHub, the user can provide any string for the owner and repo fields. These inputs are not validated or safely encoded and are sent directly to the server. This means a user can add path traversal patterns like `../` in the input to access any other endpoints on api.github.com that were not intended. Version 0.4.3 contains a patch for the issue. No known workarounds are available.
CVE Details
CVSS v3.1 ScoreN/A
Published6/25/2025
Last Modified6/26/2025
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-20CWE-22
References
https://github.com/JuliaWeb/GitForge.jl/pull/50(security-advisories@github.com)
https://github.com/JuliaWeb/GitForge.jl/security/advisories/GHSA-g2xx-229f-3qjm(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.