CVE-2026-28292:
CVE-2026-28292
`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and...
Overview
A critical security vulnerability has been discovered in simple-git, a popular npm package used to run Git commands from within Node.js applications. This flaw, tracked as CVE-2026-28292, allows an attacker to bypass previous security fixes and execute arbitrary code on the host server. The vulnerability is present in versions 3.15.0 through 3.32.2.
Vulnerability Details
In simple terms, this vulnerability exists because the fixes for two prior critical flaws (CVE-2022-25860 and CVE-2022-25912) were incomplete. An attacker can craft malicious input that tricks the simple-git library into executing operating system commands instead of just Git commands. This typically occurs when the library processes user-controlled input, such as repository URLs or branch names fetched from an external source.
Impact and Severity
This is a Critical-severity vulnerability with a CVSS score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The impact is severe:
- Full Remote Code Execution (RCE): An unauthenticated remote attacker can run any command on the server hosting the vulnerable application.
- Complete System Compromise: This can lead to data theft, installation of malware, service disruption, or use of the server as a foothold for further attacks within your network.
- Widespread Risk: Given
simple-git’s popularity in automation scripts, CI/CD pipelines, and backend services, many applications could be exposed.
For context on how such vulnerabilities lead to real-world incidents, recent data breach reports are available at breach reports.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Fix: Update the Package
The only complete remediation is to upgrade simple-git to version 3.23.0 or later. Version 3.23.0 contains the corrected fix.
- Command: Run
npm update simple-gitoryarn upgrade simple-gitin your project directory. - Verify: Confirm your
package.jsonnow references version^3.23.0or higher.
Temporary Mitigation (If Immediate Update is Impossible):
- Input Sanitization: Rigorously validate and sanitize all user inputs passed to
simple-gitfunctions, especially repository URLs and branch names. Treat them as untrusted. - Network Controls: Restrict network access to applications using
simple-gitto only necessary sources. - Principle of Least Privilege: Ensure the Node.js process runs with the minimum system permissions required.
Action Steps:
- Inventory all your applications and services that use the
simple-gitnpm package. - Check the installed version immediately.
- Plan and execute updates to version 3.23.0 or newer as a high-priority task.
- Review application logs for any suspicious activity prior to patching.
Stay informed on emerging threats by following the latest security news. Do not delay in applying this patch, as exploitation of this vulnerability can lead to a significant security incident.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-28292?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field ma...
OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a secur...
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the reque...
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code ...
Other Node.js Vulnerabilities
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field ma...
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the reque...
OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a secur...