CVE-2025-48384

Git Git — Git Link Following Vulnerability
⚠️ CVSS 3.1  8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Git contains a link following vulnerability that stems from Git’s inconsistent handling of carriage return characters in configuration files.

This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9 ; https://access.redhat.com/errata/RHSA-2025:13933 ; https://alas.aws.amazon.com/AL2/ALAS2-2025-2941.html ; https://linux.oracle.com/errata/ELSA-2025-11534.html ; https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48384 ; https://nvd.nist.gov/vuln/detail/CVE-2025-48384

Key Details

PropertyValue
CVE ID CVE-2025-48384
Vendor / Product Git — Git
NVD Published2025-07-08
NVD Last Modified2025-11-06
CVSS 3.1 Score8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
SeverityHIGH
CWE CWE-59
CISA KEV Added2025-08-25
CISA KEV Deadline2025-09-15
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2025-09-15. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2025-08-25Added to CISA Known Exploited Vulnerabilities catalog
2025-09-15CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2025-48384 Vulnerability Database
CISA KEV Catalog Entry US Government