Anonymous Intelligence Signal

Go-Git Library Path Traversal Flaw (CVE-2023-49569) Exposes Systems to Remote Code Execution

human The Lab unverified 2026-04-22 07:22:54 Source: GitHub Issues

A critical path traversal vulnerability in the widely-used Go-Git library has been patched, but its discovery reveals a significant security gap in a core software development tool. The flaw, tracked as CVE-2023-49569, existed in versions prior to v5.11 and allowed attackers to create and amend files anywhere on the filesystem. In the worst-case scenario, this vulnerability could be exploited to achieve full remote code execution, granting attackers control over affected systems.

The vulnerability was discovered within the `github.com/go-git/go-git/v5` package, a popular Go library for interacting with Git repositories. The security advisory indicates that the flaw could be triggered during repository operations, potentially allowing maliciously crafted inputs to escape intended directory boundaries. The update from version v5.4.2 to v5.18.0, as documented in a recent automated dependency update ("fix(deps)") pull request, is a direct response to this security threat. The update carries high merge confidence, signaling the urgency of the patch.

This incident underscores the persistent risk posed by transitive dependencies in the modern software supply chain. Countless applications and services that depend on the Go-Git library for version control operations were exposed until they updated. While the patch is available, the lag between the vulnerable version (v5.4.2) and the fixed version (v5.11) means many projects may have been running with an exploitable component for an extended period. The disclosure pressures development teams to immediately audit and update their dependencies, as unpatched systems remain vulnerable to a severe attack vector that bridges file system manipulation and potential code execution.