CVE-2025-54584
JavaScript vulnerability analysis and mitigation

Overview

GitProxy is an application that stands between developers and a Git remote endpoint (e.g., github.com). In versions 1.19.1 and below, an attacker can craft a malicious Git packfile to exploit the PACK signature detection in the parsePush.ts file. The vulnerability was discovered in July 2025 and affects all GitProxy installations up to version 1.19.1. The issue was fixed in version 1.19.2 (GitHub Advisory, NVD).

Technical details

The vulnerability stems from the parsePush.ts file's method of locating Git PACK files by searching for the last occurrence of the string 'PACK' in the incoming push payload using buffer.lastIndexOf('PACK'). This implementation assumes that any 'PACK' string near the end of the push is the beginning of the actual binary Git packfile. However, Git objects can contain arbitrary content, including the word 'PACK' in binary or non-compressed blobs. The vulnerability has been assigned a CVSS v4.0 base score of 7.0 (High) with the vector string CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N (GitHub Advisory).

Impact

Attackers with push access can hide commits from scanning/approval and make changes that bypass policies, potentially inserting unwanted or malicious code into a GitProxy protected repository. The vulnerability impacts all users or organizations relying on GitProxy to enforce policies and prevent unapproved changes. While it requires no elevated privileges beyond regular push access and no extra user interaction, it does require considerable technical skill and intentional effort to exploit (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in GitProxy version 1.19.2. All users and organizations are strongly advised to upgrade to this latest version to receive the critical security fixes. The fix includes improvements to the packfile parsing logic and additional validation checks (GitHub Release).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65959HIGH8.7
  • JavaScriptJavaScript
  • open-webui
NoYesDec 04, 2025
CVE-2025-66032HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesDec 03, 2025
CVE-2025-65945HIGH7.5
  • JavaScriptJavaScript
  • jws
NoYesDec 04, 2025
CVE-2025-66404MEDIUM6.4
  • JavaScriptJavaScript
  • mcp-server-kubernetes
NoYesDec 03, 2025
CVE-2025-66479LOW1.8
  • JavaScriptJavaScript
  • @anthropic-ai/sandbox-runtime
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management