PatchSiren cyber security CVE debrief
CVE-2026-6951 Simple Git Project CVE debrief
CVE-2026-6951 affects the Node.js package simple-git before 3.36.0. According to the CVE record, the earlier fix for CVE-2022-25912 was incomplete: blocking the -c option did not fully block the equivalent --config form. If untrusted input can influence the options argument passed to simple-git, an attacker may be able to reach remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.
- Vendor
- Simple Git Project
- Product
- Simple-Git
- CVSS
- HIGH 8.2
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-25
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-04-25
- Advisory updated
- 2026-05-18
Who should care
Teams that use simple-git in Node.js applications, especially code paths where user-controlled input can reach git options or clone sources, should treat this as a high-priority dependency issue.
Technical summary
NVD marks the issue as analyzed and maps it to CWE-94. The vulnerable range is simple-git versions 3.15.0 through before 3.36.0. The problem is an incomplete mitigation for CVE-2022-25912: rejecting -c alone was insufficient because --config can express the same behavior. When attacker influence reaches the options argument, the documented attack path is to enable protocol.ext.allow=always and use an ext:: clone source, which can lead to RCE.
Defensive priority
High. The CVSS vector indicates network exposure, no privileges required, no user interaction, and high impact if the affected input flow is exposed.
Recommended defensive actions
- Upgrade simple-git to 3.36.0 or later.
- Audit any code that passes untrusted data into the options argument or clone source parameters.
- Ensure application-level validation or allowlisting prevents users from controlling git configuration flags.
- Review mitigations for CVE-2022-25912 to confirm they block both -c and --config forms.
- Rebuild and redeploy applications after updating the dependency lockfile.
Evidence notes
Basis: the NVD CVE record for CVE-2026-6951, the supplied CVE description, and the referenced patch/advisory materials. The record lists vulnerable versions as simple-git 3.15.0 through before 3.36.0, CVSS v4.0 8.2 (HIGH), and CWE-94. The description specifically states that the prior fix for CVE-2022-25912 was incomplete because --config was not blocked when -c was.
Official resources
-
CVE-2026-6951 CVE record
CVE.org
-
CVE-2026-6951 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory
Publicly disclosed in the CVE/NVD record on 2026-04-25 and last modified in NVD on 2026-05-18.