Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). In mcp-server-git versions prior to 2025.9.25, the git_init tool accepted arbitrary filesystem paths and created Git repositories without validating the target location. Unlike other tools which required an existing repository, git_init could operate on any directory accessible to the server process, making those directories eligible for subsequent git operations. The tool was removed entirely, as the server is intended to operate on existing repositories only. Users are advised to upgrade to 2025.9.25 or newer to remediate this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 19 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Modelcontextprotocol
Modelcontextprotocol servers |
|
| Vendors & Products |
Modelcontextprotocol
Modelcontextprotocol servers |
Wed, 17 Dec 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). In mcp-server-git versions prior to 2025.9.25, the git_init tool accepted arbitrary filesystem paths and created Git repositories without validating the target location. Unlike other tools which required an existing repository, git_init could operate on any directory accessible to the server process, making those directories eligible for subsequent git operations. The tool was removed entirely, as the server is intended to operate on existing repositories only. Users are advised to upgrade to 2025.9.25 or newer to remediate this issue. | |
| Title | mcp-server-git's unrestricted git_init tool allows repository creation at arbitrary filesystem locations | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-18T15:07:15.061Z
Reserved: 2025-12-15T18:15:08.404Z
Link: CVE-2025-68143
Updated: 2025-12-18T14:53:36.878Z
Status : Awaiting Analysis
Published: 2025-12-17T23:16:04.560
Modified: 2025-12-18T15:07:42.550
Link: CVE-2025-68143
No data.
OpenCVE Enrichment
Updated: 2025-12-18T09:56:22Z