[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-6951":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-25T12:20:59.409Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":32,"aliases":33,"duplicate_of":9,"upstream":34,"downstream":35,"duplicates":36,"related":37,"reserved_at":9,"published_at":38,"modified_at":38,"state":39,"summary":40,"references_raw":47,"kevs":61,"epss":9,"epss_history":62,"metrics":63,"affected":74},"CVE-2026-6951","Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-94","Improper Control of Generation of Code ('Code Injection')","The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.","weakness","Draft","Base","Medium",[20,24,28],{"id":21,"name":22,"techniques":23},"CAPEC-242","Code Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-35","Leverage Executable Code in Non-Executable Files",[],{"id":29,"name":30,"techniques":31},"CAPEC-77","Manipulating User-Controlled Variables",[],[],[],[],[],[],[],"2026-04-25T05:00:05.257Z","Received",{"cisa_kev":41,"cisa_ransomware":41,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":42,"severity_score":43,"severity_version":44,"severity_source":45,"severity_vector":46,"severity_status":39},false,"critical",9.8,"v3.1","nvd","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[48,53,57],{"url":49,"sources":50,"tags":52},"https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-15456078",[51,45],"cve.org",[],{"url":54,"sources":55,"tags":56},"https://gist.github.com/KKC73/02d1d97f3410756095b501fda0ac8ca6",[51,45],[],{"url":58,"sources":59,"tags":60},"https://github.com/steveukx/git-js/commit/89a2294febed5dfe737c4c735d936bb6018746a8",[51,45],[],[],[],[64,69],{"source":51,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":65},{"baseScore":66,"baseSeverity":67,"vectorString":68,"impactScore":9,"exploitabilityScore":9},9.2,"CRITICAL","CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",{"source":45,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":70,"cvss_v4_0":72},{"baseScore":43,"baseSeverity":67,"vectorString":46,"impactScore":43,"exploitabilityScore":71},10,{"baseScore":66,"baseSeverity":67,"vectorString":73,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[]]