← Back to CVEs
CVE-2026-28292
CRITICAL9.8
Description
`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code execution on the host machine. Version 3.23.0 contains an updated fix for the vulnerability.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/10/2026
Last Modified3/12/2026
Sourcenvd
Honeypot Sightings0
Affected Products
simple-git_project:simple-git
Weaknesses (CWE)
CWE-78CWE-178
References
https://github.com/steveukx/git-js/commit/f7042088aa2dac59e3c49a84d7a2f4b26048a257(security-advisories@github.com)
https://www.codeant.ai/security-research/security-research-simple-git-remote-code-execution-cve-2026-28292(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.