Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks

Posted on August 26, 2025August 26, 2025 By CWS

CISA has issued a high-severity warning for CVE-2025-48384, a link-following vulnerability in Git that allows arbitrary file writes through misconfigured carriage return dealing with in configuration recordsdata. 

This flaw has already seen lively exploitation, underscoring the crucial want for fast mitigation.

Key Takeaways1. CVE-2025-48384 lets attackers abuse CR dealing with in Git configs to jot down arbitrary recordsdata.2. It endangers CI/CD and construct methods.3. Improve and apply BOD 22-01 controls.

Git Arbitrary File Write Vulnerability

CVE-2025-48384 arises from Git’s inconsistent dealing with of trailing carriage return (CR) characters in .git/config and different configuration entries. When Git reads a config worth, it strips any trailing CR and line feed (LF) characters. 

Nonetheless, when writing a config entry that ends with a CR, Git doesn’t quote the worth, inflicting the CR to be misplaced after re-read. This conduct might be abused throughout submodule initialization:

On this case, Git strips r on learn, altering the meant path (e.g., payload as a substitute of payloadr). If a symlink named payload factors to .git/hooks, a cloned repository can place an attacker-controlled post-checkout hook into the hooks listing.

Upon checkout, this hook executes arbitrary code with the consumer’s privileges, permitting arbitrary file writes anyplace on the filesystem.

This flaw is cataloged underneath CWE-59 (Hyperlink Following) and CWE-436 (Interpretation of Trusted Enter). 

Though no direct hyperlink to ransomware campaigns has been confirmed, the potential for chain-loading malicious hooks makes this vulnerability exceptionally harmful in automated construct and CI/CD pipelines.

Threat FactorsDetailsAffected ProductsGit variations ≤ 2.50.0 (together with upkeep tracks 2.43.7–2.49.1) EImpactArbitrary file writes or code executionExploit PrerequisitesClone an untrusted repository containing a submodule whose path ends with rCVSS 3.1 Score8.0 (Excessive)

Mitigations 

CISA advises organizations to use fixes as detailed by Git maintainers and distributors directly.

Replace Git to model 2.50.1 (and subsequent patches on older upkeep tracks 2.43.7 by means of 2.49.1) obtainable on the official kernel.org repositories.

For cloud-based growth environments, implement Binding Operational Directive (BOD) 22-01 controls to implement patching or disable susceptible Git installations centrally.

If fast patching will not be possible, disable Git submodule initialization or take away the .git/hooks/post-checkout script from CI/CD runners and developer workstations.

All organizations are urged to deal with this vulnerability with pressing precedence, guaranteeing patches are deployed by September 15, 2025, the official due date for remediation. 

Failure to handle CVE-2025-48384 might lead to unauthorized code execution, information tampering, or supply-chain compromise inside crucial software program growth lifecycles.

Discover this Story Fascinating! Observe us on LinkedIn and X to Get Extra Immediate Updates.

Cyber Security News Tags:Arbitrary, Attacks, CISA, Exploited, File, Git, Vulnerability, Warns, Write

Post navigation

Previous Post: AccuKnox Awarded Patent for Runtime Security of Kernel Events
Next Post: Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab

Related Posts

Cisco Nexus Dashboard Fabric Controller Vulnerability Allows Attackers Device Impersonate as Managed Devices Cyber Security News
Top 10 Best Mobile Application Penetration Testing Companies in 2025 Cyber Security News
Hackers Using PUP Advertisements to Silently Drop Windows Malware Cyber Security News
How Winning SOCs Always Stay Ahead of Threats  Cyber Security News
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
Cybersecurity News Weekly Newsletter – Fortinet, Chrome 0-Day Flaws, Cloudflare Outage and Salesforce Gainsight Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark