<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Gitpython_project on CVE Alert &amp; Security Feed</title><link>https://cvealert.net/vendors/gitpython_project/</link><description>Recent content in Gitpython_project on CVE Alert &amp; Security Feed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 07 May 2026 19:16:02 +0000</lastBuildDate><atom:link href="https://cvealert.net/vendors/gitpython_project/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-44243</title><link>https://cvealert.net/posts/cve-2026-44243/</link><pubDate>Thu, 07 May 2026 19:16:02 +0000</pubDate><guid>https://cvealert.net/posts/cve-2026-44243/</guid><description>GitPython is a python library used to interact with Git repositories. Prior to version 3.1.48, a vulnerability in GitPython allows attackers who can supply a crafted reference path to an application using GitPython to write, overwrite, move, or delete files outside the repository’s .git directory via insufficient validation of reference paths in reference creation, rename, and delete operations. This issue has been patched in version 3.1.48.</description></item><item><title>CVE-2026-42284</title><link>https://cvealert.net/posts/cve-2026-42284/</link><pubDate>Thu, 07 May 2026 19:16:01 +0000</pubDate><guid>https://cvealert.net/posts/cve-2026-42284/</guid><description>GitPython is a python library used to interact with Git repositories. Prior to version 3.1.47, _clone() validates multi_options as the original list, then executes shlex.split(&amp;quot; &amp;ldquo;.join(multi_options)). A string like &amp;ldquo;&amp;ndash;branch main &amp;ndash;config core.hooksPath=/x&amp;rdquo; passes validation (starts with &amp;ndash;branch), but after split becomes [&amp;rdquo;&amp;ndash;branch&amp;quot;, &amp;ldquo;main&amp;rdquo;, &amp;ldquo;&amp;ndash;config&amp;rdquo;, &amp;ldquo;core.hooksPath=/x&amp;rdquo;]. Git applies the config and executes attacker hooks during clone. This issue has been patched in version 3.1.47.</description></item></channel></rss>