Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks

CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks

Posted on August 26, 2025August 26, 2025 By CWS

CISA has issued a high-severity warning for CVE-2025-48384, a link-following vulnerability in Git that allows arbitrary file writes through misconfigured carriage return dealing with in configuration recordsdata. 

This flaw has already seen lively exploitation, underscoring the crucial want for fast mitigation.

Key Takeaways1. CVE-2025-48384 lets attackers abuse CR dealing with in Git configs to jot down arbitrary recordsdata.2. It endangers CI/CD and construct methods.3. Improve and apply BOD 22-01 controls.

Git Arbitrary File Write Vulnerability

CVE-2025-48384 arises from Git’s inconsistent dealing with of trailing carriage return (CR) characters in .git/config and different configuration entries. When Git reads a config worth, it strips any trailing CR and line feed (LF) characters. 

Nonetheless, when writing a config entry that ends with a CR, Git doesn’t quote the worth, inflicting the CR to be misplaced after re-read. This conduct might be abused throughout submodule initialization:

On this case, Git strips r on learn, altering the meant path (e.g., payload as a substitute of payloadr). If a symlink named payload factors to .git/hooks, a cloned repository can place an attacker-controlled post-checkout hook into the hooks listing.

Upon checkout, this hook executes arbitrary code with the consumer’s privileges, permitting arbitrary file writes anyplace on the filesystem.

This flaw is cataloged underneath CWE-59 (Hyperlink Following) and CWE-436 (Interpretation of Trusted Enter). 

Though no direct hyperlink to ransomware campaigns has been confirmed, the potential for chain-loading malicious hooks makes this vulnerability exceptionally harmful in automated construct and CI/CD pipelines.

Threat FactorsDetailsAffected ProductsGit variations ≤ 2.50.0 (together with upkeep tracks 2.43.7–2.49.1) EImpactArbitrary file writes or code executionExploit PrerequisitesClone an untrusted repository containing a submodule whose path ends with rCVSS 3.1 Score8.0 (Excessive)

Mitigations 

CISA advises organizations to use fixes as detailed by Git maintainers and distributors directly.

Replace Git to model 2.50.1 (and subsequent patches on older upkeep tracks 2.43.7 by means of 2.49.1) obtainable on the official kernel.org repositories.

For cloud-based growth environments, implement Binding Operational Directive (BOD) 22-01 controls to implement patching or disable susceptible Git installations centrally.

If fast patching will not be possible, disable Git submodule initialization or take away the .git/hooks/post-checkout script from CI/CD runners and developer workstations.

All organizations are urged to deal with this vulnerability with pressing precedence, guaranteeing patches are deployed by September 15, 2025, the official due date for remediation. 

Failure to handle CVE-2025-48384 might lead to unauthorized code execution, information tampering, or supply-chain compromise inside crucial software program growth lifecycles.

Discover this Story Fascinating! Observe us on LinkedIn and X to Get Extra Immediate Updates.

Cyber Security News Tags:Arbitrary, Attacks, CISA, Exploited, File, Git, Vulnerability, Warns, Write

Post navigation

Previous Post: AccuKnox Awarded Patent for Runtime Security of Kernel Events
Next Post: Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab

Related Posts

Cornwell Quality Tools Data Breach Cornwell Quality Tools Data Breach Cyber Security News
Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News
Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft Cyber Security News
1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers 1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers Cyber Security News
Google Confirms Data Breach – Notifying Users Affected By the Cyberattack Google Confirms Data Breach – Notifying Users Affected By the Cyberattack Cyber Security News
Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark