CVE-2025-48386

6.3 MEDIUM

📋 TL;DR

This CVE describes a buffer overflow vulnerability in Git's wincred credential helper on Windows systems. The helper uses a static buffer without proper bounds checking when appending data, potentially allowing attackers to execute arbitrary code or crash Git processes. This affects Windows users running vulnerable Git versions with the wincred credential helper enabled.

💻 Affected Systems

Products:
  • Git
Versions: All versions before v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems using the wincred credential helper. Linux/macOS systems are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, credential theft, or lateral movement within the network.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption that could be leveraged for information disclosure.

🟢

If Mitigated

No impact if patched versions are used or if wincred helper is disabled on affected systems.

🌐 Internet-Facing: LOW - Git is typically not directly internet-facing, though could be exploited through malicious repositories or CI/CD pipelines.
🏢 Internal Only: MEDIUM - Internal developers and systems using vulnerable Git versions could be targeted through social engineering or compromised internal repositories.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering the wincred helper with specially crafted input, likely through Git operations. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, or v2.50.1

Vendor Advisory: https://github.com/git/git/security/advisories/GHSA-4v56-3xvj-xvfr

Restart Required: No

Instructions:

1. Download latest patched Git version from https://git-scm.com/download/win 2. Run installer 3. Verify installation with 'git --version'

🔧 Temporary Workarounds

Disable wincred credential helper

windows

Switch to a different credential helper or disable credential caching

git config --global --unset credential.helper
git config --global credential.helper ""

Use alternative credential helper

windows

Configure Git to use manager-core or other credential helpers

git config --global credential.helper manager-core

🧯 If You Can't Patch

  • Disable wincred credential helper globally using git config commands
  • Restrict Git operations to trusted repositories only and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Run 'git --version' and check if version is below patched versions listed in advisory

Check Version:

git --version

Verify Fix Applied:

Run 'git --version' and confirm version is v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, or v2.50.1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Git process crashes
  • Abnormal memory usage in Git processes
  • Failed credential helper operations

Network Indicators:

  • Unusual Git protocol traffic patterns
  • Connections to unexpected Git repositories

SIEM Query:

Process:git.exe AND (EventID:1000 OR EventID:1001) OR Process:git.exe AND MemoryUsage > [threshold]

🔗 References

📤 Share & Export