{"id":"CVE-2023-26134","details":"Versions of the package git-commit-info before 2.0.2 are vulnerable to Command Injection such that the package-exported method gitCommitInfo () fails to sanitize its parameter commit, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they control the hash content.","aliases":["GHSA-h42j-mrmp-9369"],"modified":"2026-03-14T11:59:32.422610Z","published":"2023-06-28T05:15:10.467Z","references":[{"type":"REPORT","url":"https://github.com/JPeer264/node-git-commit-info/issues/24"},{"type":"FIX","url":"https://github.com/JPeer264/node-git-commit-info/commit/f7c491ede51f886a988af9b266797cb24591d18c"},{"type":"EVIDENCE","url":"https://security.snyk.io/vuln/SNYK-JS-GITCOMMITINFO-5740174"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jpeer264/node-git-commit-info","events":[{"introduced":"0"},{"fixed":"8dfad57a2b5d78cb0c91d8d61bfff3a23ede4daf"},{"fixed":"f7c491ede51f886a988af9b266797cb24591d18c"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.0.2"}]}}],"versions":["v1.0.0","v1.0.1","v1.1.0","v2.0.0","v2.0.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-26134.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}