CVE-2026-28291: simple-git Affected by Command Execution via Option-Parsing Bypass
(updated )
simple-git enables running native Git commands from JavaScript. Some commands accept options that allow executing another command; because this is very dangerous, execution is denied unless the user explicitly allows it. This vulnerability allows a malicious actor who can control the options to execute other commands even in a “safe” state where the user has not explicitly allowed them. The vulnerability was introduced by an incorrect patch for CVE-2022-25860. It is likely to affect all versions prior to and including 3.28.0.
References
- github.com/advisories/GHSA-jcxm-m3jx-f287
- github.com/steveukx/git-js
- github.com/steveukx/git-js/blob/789c13ebabcf18ebe0b3a0c88ebb4037dede42e3/simple-git/src/lib/plugins/block-unsafe-operations-plugin.ts
- github.com/steveukx/git-js/commit/1effd8e5012a5da05a9776512fac3e39b11f2d2d
- github.com/steveukx/git-js/releases/tag/simple-git%403.32.0
- github.com/steveukx/git-js/security/advisories/GHSA-jcxm-m3jx-f287
- nvd.nist.gov/vuln/detail/CVE-2026-28291
- www.cve.org/CVERecord?id=CVE-2022-25860
Code Behaviors & Features
Detect and mitigate CVE-2026-28291 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →