CVE-2026-6951
ADVISORY - githubSummary
Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for CVE-2022-25912 that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.
EPSS Score: 0.00111 (0.290)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Control of Generation of Code ('Code Injection')
ADVISORY - github
Improper Control of Generation of Code ('Code Injection')
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in