CVE-2025-26625
Git LFS vulnerability analysis and mitigation

Overview

Git LFS (Git Large File Storage) versions 0.5.2 through 3.7.0 contain a vulnerability (CVE-2025-26625) where the git lfs checkout and git lfs pull commands do not properly check for symbolic links before writing to files in the working tree. This vulnerability was discovered and disclosed on October 17, 2025, affecting all Git LFS installations since version 0.5.2 (GitHub Advisory, NVD).

Technical details

The vulnerability stems from improper link resolution before file access, classified as CWE-59. When populating a Git repository's working tree with Git LFS objects, certain commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The vulnerability has received a CVSS v4.0 score of 8.6 (HIGH) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

When exploited, this vulnerability could allow an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. Additionally, when git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository (Miggo).

Mitigation and workarounds

The vulnerability has been patched in Git LFS version 3.7.1. As a workaround, users can disable support for symlinks in Git by setting the core.symlinks configuration option to false, which will prevent further clones and fetches from creating symbolic links. However, existing symbolic or hard links in repositories will still present a potential risk. All users are strongly advised to upgrade to version 3.7.1 (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Git LFS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2020-27955CRITICAL9.8
  • Git LFSGit LFS
  • git-lfs
NoYesNov 05, 2020
CVE-2025-26625HIGH8.6
  • Git LFSGit LFS
  • git-lfs
NoYesOct 17, 2025
CVE-2024-53263HIGH8.5
  • Rocky LinuxRocky Linux
  • github.com/git-lfs/git-lfs
NoYesJan 14, 2025
CVE-2022-24826HIGH7.8
  • Git LFSGit LFS
  • cpe:2.3:a:git_large_file_storage_project:git_large_file_storage
NoYesApr 20, 2022
CVE-2021-21237HIGH7.8
  • Git LFSGit LFS
  • github.com/git-lfs/git-lfs
NoYesJan 15, 2021

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management