Git Option Manipulation Flaw Bypasses Safety Checks

Git Option Manipulation Flaw Bypasses Safety Checks

A critical vulnerability, tracked as CVE-2026-28291, has been identified in simple-git versions up to and including 3.31.1. This library, designed to execute native Git commands from JavaScript, harbors a flaw allowing arbitrary command execution. The issue stems from an incomplete patch for an earlier vulnerability, CVE-2022-25860, which attempted to block dangerous Git options like -u and --upload-pack.

According to the National Vulnerability Database, the core problem lies in Git’s highly flexible option parsing. Attackers can leverage numerous character combinations, such as -vu, -4u, or -nu, to effectively bypass the regular-expression-based blocklist implemented in the unsafe operations plugin. This sophisticated evasion technique demonstrates a significant challenge for blocklist-based mitigations, as the sheer volume of valid option variants makes comprehensive blocking virtually impossible without fully emulating Git’s parsing behavior. The National Vulnerability Database indicates this high-severity flaw has been addressed in simple-git version 3.32.0, urging immediate updates.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 5 SIEM formats

5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

medium T1204.002 Execution

Suspicious File Download via Email

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-28291 Command Injection simple-git versions up to and including 3.31.1
CVE-2026-28291 Command Injection Bypass of safety checks for dangerous Git options like -u and --upload-pack
CVE-2026-28291 Command Injection Incomplete fix for CVE-2022-25860
CVE-2026-28291 Command Injection Exploitation via Git option manipulation using character combinations (e.g., -vu, -4u, -nu)
CVE-2026-28291 Patch Upgrade simple-git to version 3.32.0 or later

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs