All versions of the package check-branches are vulnerable to Command Injection check-branches is a command-line tool that is interacted with locally, or via CI, to confirm no conflicts exist in git branches.
However, the library follows these conventions which can be abused:
1. It trusts branch names as they are (plain text)
2. It spawns git commands by concatenating user input
Since a branch name is potentially a user input - as users can create branches remotely via pull requests, or simply due to privileged access to a repository - it can effectively be abused to run any command.
Metrics
Affected Vendors & Products
References
History
Thu, 02 Oct 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Check-branches Project
Check-branches Project check-branches |
|
Vendors & Products |
Check-branches Project
Check-branches Project check-branches |
Tue, 30 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All versions of the package check-branches are vulnerable to Command Injection check-branches is a command-line tool that is interacted with locally, or via CI, to confirm no conflicts exist in git branches. However, the library follows these conventions which can be abused: 1. It trusts branch names as they are (plain text) 2. It spawns git commands by concatenating user input Since a branch name is potentially a user input - as users can create branches remotely via pull requests, or simply due to privileged access to a repository - it can effectively be abused to run any command. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-09-30T19:06:21.373Z
Reserved: 2025-09-29T09:12:03.488Z
Link: CVE-2025-11148

Updated: 2025-09-30T19:06:12.881Z

Status : Received
Published: 2025-09-30T11:37:38.883
Modified: 2025-09-30T19:15:35.950
Link: CVE-2025-11148

No data.