Skip to content

Commit 0dbd699

Browse files
committed
fix(security): patch command injection vulnerability
Replaced all instances of `child_process.exec` with `child_process.execFile` to prevent shell metacharacter injection. This ensures that user-provided input is treated as arguments rather than being executed as part of a shell command, mitigating the risk of remote code execution. This addresses the vulnerability disclosed in GHSA-3q26-f695-pp76. Special thanks to @dellalibera for the responsible disclosure.
1 parent f30169e commit 0dbd699

File tree

26 files changed

+519
-2771
lines changed

26 files changed

+519
-2771
lines changed

CHANGELOG.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,11 @@
22

33
All notable changes to this project will be documented in this file.
44

5+
## v2.1.5 - 2025-06-29
6+
7+
### Security
8+
- Patched a command injection vulnerability where unsanitized user input could be passed to `child_process.exec`. All `exec` calls have been replaced with the safer `execFile` method, which treats arguments as distinct values rather than executable script parts. Thank you to [@dellalibera](https://github.com/dellalibera) for the disclosure. For more details, see the security advisory: [GHSA-3q26-f695-pp76](https://github.com/cyanheads/git-mcp-server/security/advisories/GHSA-3q26-f695-pp76).
9+
510
## v2.1.4 - 2025-06-20
611

712
### Changed

0 commit comments

Comments
 (0)