CVE-2026-44244
Description
GitPython is a python library used to interact with Git repositories. Prior to version 3.1.49, GitConfigParser.set_value() passes values to Python's configparser without validating for newlines. GitPython's own _write() converts embedded newlines into indented continuation lines (e.g. \n becomes \n\t), but Git still accepts an indented [core] stanza as a section header — so the injected core.hooksPath becomes effective configuration. Any Git operation that invokes hooks (commit, merge, checkout) will then execute scripts from the attacker-controlled path. This issue has been patched in version 3.1.49.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
GitPythonPyPI | < 3.1.49 | 3.1.49 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/gitpython-developers/GitPython/releases/tag/3.1.49nvdPatchRelease NotesWEB
- github.com/gitpython-developers/GitPython/security/advisories/GHSA-v87r-6q3f-2j67nvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-v87r-6q3f-2j67ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-44244ghsaADVISORY
News mentions
0No linked articles in our index yet.