CISA has issued a high-severity alert for CVE-2025-48384, a Git flaw that allows attackers to write arbitrary files by exploiting how Git handles carriage return characters in configuration files. The issue has already been actively exploited.
The vulnerability lets attackers inject malicious hooks during submodule initialization, leading to unauthorized code execution with user privileges. It poses a serious risk to CI/CD pipelines and automated build systems.
Organizations are urged to update Git to version 2.50.1 or apply patches for older versions. If patching is delayed, disabling submodule initialization or removing the post-checkout hook is recommended.
All fixes should be in place by September 15, 2025, to avoid potential data breaches or supply chain attacks.
Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post.