Git Option Manipulation Flaw Bypasses Safety Checks
A critical vulnerability, tracked as CVE-2026-28291, has been identified in simple-git versions up to and including 3.31.1. This library, designed to execute native Git commands from JavaScript, harbors a flaw allowing arbitrary command execution. The issue stems from an incomplete patch for an earlier vulnerability, CVE-2022-25860, which attempted to block dangerous Git options like -u and --upload-pack.
According to the National Vulnerability Database, the core problem lies in Git’s highly flexible option parsing. Attackers can leverage numerous character combinations, such as -vu, -4u, or -nu, to effectively bypass the regular-expression-based blocklist implemented in the unsafe operations plugin. This sophisticated evasion technique demonstrates a significant challenge for blocklist-based mitigations, as the sheer volume of valid option variants makes comprehensive blocking virtually impossible without fully emulating Git’s parsing behavior. The National Vulnerability Database indicates this high-severity flaw has been addressed in simple-git version 3.32.0, urging immediate updates.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 5 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Suspicious File Download via Email
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-28291 | Command Injection | simple-git versions up to and including 3.31.1 |
| CVE-2026-28291 | Command Injection | Bypass of safety checks for dangerous Git options like -u and --upload-pack |
| CVE-2026-28291 | Command Injection | Incomplete fix for CVE-2022-25860 |
| CVE-2026-28291 | Command Injection | Exploitation via Git option manipulation using character combinations (e.g., -vu, -4u, -nu) |
| CVE-2026-28291 | Patch | Upgrade simple-git to version 3.32.0 or later |