CVE-2022-41953
Git vulnerability analysis and mitigation

Overview

Git GUI, a graphical tool bundled with Git for Windows, contains a critical vulnerability (CVE-2022-41953) that could allow remote code execution. The vulnerability affects versions <=2.39.0(2) and was patched in version >=2.39.1. The issue stems from Git GUI's automatic post-processing of cloned repositories, where it attempts to run a spell checker called aspell.exe. Due to Tcl's design on Windows, the search path for executables always includes the current directory, allowing malicious repositories to execute arbitrary code through a crafted aspell.exe file (GHSA Advisory).

Technical details

The vulnerability occurs during Git GUI's repository cloning process. After completing a local clone, Git GUI automatically performs post-processing operations, including running a spell checker. Due to Tcl/Tk's implementation on Windows, when searching for executables, the current directory is always included in the search path. This behavior allows a malicious repository to include an aspell.exe file in its top-level directory, which would be executed automatically without user inspection. The vulnerability has been assigned a CVSS score of 8.6 (High), with attack vector being Local, attack complexity Low, and requiring user interaction (CERT EU, GHSA Advisory).

Impact

The vulnerability allows attackers to achieve remote code execution on the target system when a user clones a malicious repository using Git GUI. This can lead to unauthorized access, data theft, and system compromise with the same privileges as the user running Git GUI (Help Net Security).

Mitigation and workarounds

Users are advised to upgrade to Git for Windows version 2.39.1 or later which contains the fix. As a workaround, users should avoid using Git GUI for cloning repositories, or at minimum, avoid cloning from untrusted sources. The fix was implemented in commit 91b0797 and was also submitted as a pull request to the git-gui repository (GHSA Advisory).

Additional resources


SourceThis report was generated using AI

Related Git vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-32465HIGH7.8
  • GitGit
  • git-debugsource
NoYesMay 14, 2024
CVE-2024-52005HIGH7.5
  • GitGit
  • git-credential-libsecret-debuginfo
NoYesJan 15, 2025
CVE-2024-52006LOW2.1
  • GitGit
  • git-core-debuginfo
NoYesJan 14, 2025
CVE-2024-50349LOW2.1
  • GitGit
  • cpe:2.3:a:git:git
NoYesJan 14, 2025
ELSA-2025-11534HIGHN/A
  • GitGit
  • git
NoYesJul 22, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management