Skip to content

Argument injection in `gettreesha()` function in Registrator.jl

Critical
aviks published GHSA-w8jv-rg3h-fc68 Jun 24, 2025

Package

Registrator.jl (Julia)

Affected versions

<= 1.9.4

Patched versions

1.9.5

Description

Impact

If the clone URL returned by GitHub is malicious (or can be injected using upstream vulnerabilities), an argument injection is possible in the gettreesha() function. This can then lead to a potential RCE.

Patches

Users should upgrade immediately to v1.9.5. All prior versions are vulnerable.

Workarounds

None

References

Fixed by: #449 (which is available in v1.9.5).

Credits

Thanks to splitline from the DEVCORE Research Team for reporting this issue.

Severity

Critical

CVE ID

CVE-2025-52480

Weaknesses

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

The product constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string. Learn more on MITRE.