The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-48384

CVE-2025-48384: Git-scm Git RCE Vulnerability

CVE-2025-48384 is a remote code execution vulnerability in Git-scm Git caused by improper handling of carriage returns in submodule paths. This article covers technical details, affected versions, impact, and mitigation.

Updated: May 15, 2026

CVE-2025-48384 Overview

CVE-2025-48384 is a high-severity vulnerability in Git, the distributed revision control system maintained by the git-scm project. The flaw stems from inconsistent handling of carriage return (CR) characters when reading and writing Git configuration values. When a submodule path contains a trailing CR, Git checks out the submodule to an attacker-controlled location. If the altered location is reached through a symlink pointing to the submodule hooks directory, an executable post-checkout hook in the submodule can run automatically after checkout. The vulnerability is tracked under CWE-59: Improper Link Resolution Before File Access and is listed in the CISA Known Exploited Vulnerabilities catalog.

Critical Impact

Cloning a malicious repository with --recursive can trigger arbitrary code execution on the developer's machine through an unintentionally executed submodule hook.

Affected Products

  • Git (git-scm) versions prior to 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1
  • Debian Linux 11.0 (Git package distributed via Debian LTS)
  • Apple Xcode (bundled Git toolchain)

Discovery Timeline

  • 2025-07-08 - CVE-2025-48384 published to the National Vulnerability Database
  • 2025-07-08 - GitHub Security Advisory GHSA-vwqx-4fm8-6qc9 released by the Git project
  • 2025-10 - Debian LTS Announcement issued for Debian 11
  • 2025-11-06 - Last updated in NVD database

Technical Details for CVE-2025-48384

Vulnerability Analysis

The vulnerability arises from asymmetric handling of trailing CRLF characters in Git's configuration parser. When Git reads a config value, it strips any trailing carriage return and line feed. However, when Git writes a config entry, values with a trailing carriage return are not quoted. The result is that a CR written into a .gitmodules file is silently dropped during the next read, yielding a different value than the one originally written.

Attackers exploit this asymmetry against submodule path entries. A crafted submodule entry contains a path with a trailing CR. Git uses the unmodified path during one operation and the CR-stripped path during another. By combining the inconsistency with a symlink that points the altered path into the submodule's hooks directory, the attacker places a post-checkout script at a location Git later treats as the hooks directory. Git executes the hook automatically when checkout completes.

Root Cause

The root cause is the mismatch between config writer and reader semantics for trailing whitespace. The writer treats a trailing CR as a benign data byte, while the reader treats it as line terminator noise. This violates round-trip integrity for config values [CWE-59].

Attack Vector

Exploitation requires a victim to clone a malicious repository recursively, for example with git clone --recursive or git submodule update --init. The attacker controls the .gitmodules file and includes both a CR-terminated submodule path and a symlink that redirects the parsed path into the submodule's .git/hooks directory. After checkout, Git executes the planted post-checkout hook with the privileges of the user running the clone.

No synthetic exploit code is reproduced here. Refer to the GitHub Security Advisory GHSA-vwqx-4fm8-6qc9 and the Full Disclosure mailing list post for the upstream technical write-up.

Detection Methods for CVE-2025-48384

Indicators of Compromise

  • .gitmodules files containing submodule path values with embedded carriage return (\r) bytes
  • Symbolic links inside a cloned repository that resolve into a submodule's .git/hooks/ directory
  • Unexpected executable files named post-checkout, post-merge, or similar inside submodule hook directories shortly after a clone
  • Child processes spawned by git or git-submodule immediately after a clone --recursive or submodule update operation

Detection Strategies

  • Scan repository content and CI build logs for .gitmodules entries whose path fields contain non-printable trailing bytes
  • Alert on shell, scripting, or compiler processes whose parent process is git, git-submodule, or git-checkout on developer endpoints and build agents
  • Inventory installed Git versions across endpoints and build infrastructure and flag any version older than the fixed releases

Monitoring Recommendations

  • Forward developer workstation and CI runner process telemetry to a centralized analytics platform for parent-child process analysis of git invocations
  • Monitor outbound network connections initiated by short-lived shells spawned under git to identify post-exploitation command and control
  • Track filesystem events that create symbolic links inside .git/ directories during clone operations

How to Mitigate CVE-2025-48384

Immediate Actions Required

  • Upgrade Git to one of the fixed versions: 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, or 2.50.1
  • Apply the Debian LTS update for Debian 11 as described in the Debian LTS Announcement
  • Update Apple Xcode to a release that bundles a patched Git toolchain
  • Audit recent recursive clones of untrusted repositories on developer endpoints and CI runners for signs of hook execution

Patch Information

The Git project published GHSA-vwqx-4fm8-6qc9 along with patched releases across all supported branches. Downstream distributions including Debian and Apple have shipped corresponding updates. Operators should prioritize patching given the vulnerability's inclusion in the CISA Known Exploited Vulnerabilities catalog and an EPSS score of 0.603% (69.7th percentile).

Workarounds

  • Avoid cloning untrusted repositories with --recursive; instead clone without submodules and review .gitmodules before running git submodule update
  • Set protocol.file.allow=user and disable automatic submodule initialization in CI pipelines until patched Git binaries are deployed
  • Run Git operations against untrusted sources inside ephemeral, network-restricted sandboxes or containers
bash
# Verify the installed Git version meets the fixed release
git --version

# Disable recursive submodule fetch during clone of untrusted sources
git clone <repo-url>
grep -P '\r' .gitmodules && echo 'Suspicious CR detected in .gitmodules'

# Only initialize submodules after manual review
git submodule update --init --recursive

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechGit

  • SeverityHIGH

  • CVSS Score8.0

  • EPSS Probability0.60%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityHigh
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-59
  • Technical References
  • Full Disclosure Mailing List

  • OpenWall OSS Security Post

  • Debian LTS Announcement

  • CISA Known Exploited Vulnerability
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-45033: GitHub Copilot CLI RCE Vulnerability

  • CVE-2026-4496: Git-MCP-Server RCE Vulnerability

  • CVE-2024-32004: Git-scm Git RCE Vulnerability

  • CVE-2025-48385: Git Bundle URI RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English