High severity8.1NVD Advisory· Published May 7, 2026· Updated May 8, 2026
CVE-2026-42284
CVE-2026-42284
Description
GitPython is a python library used to interact with Git repositories. Prior to version 3.1.47, _clone() validates multi_options as the original list, then executes shlex.split(" ".join(multi_options)). A string like "--branch main --config core.hooksPath=/x" passes validation (starts with --branch), but after split becomes ["--branch", "main", "--config", "core.hooksPath=/x"]. Git applies the config and executes attacker hooks during clone. This issue has been patched in version 3.1.47.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
GitPythonPyPI | < 3.1.47 | 3.1.47 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/gitpython-developers/GitPython/releases/tag/3.1.47nvdPatchRelease NotesWEB
- github.com/gitpython-developers/GitPython/security/advisories/GHSA-x2qx-6953-8485nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-x2qx-6953-8485ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-42284ghsaADVISORY
- www.tenable.com/cve/CVE-2026-32686nvdWEB
News mentions
0No linked articles in our index yet.