check-branches is vulnerable to command Injection
Critical severity
GitHub Reviewed
Published
Sep 30, 2025
to the GitHub Advisory Database
•
Updated Oct 3, 2025
Description
Published by the National Vulnerability Database
Sep 30, 2025
Published to the GitHub Advisory Database
Sep 30, 2025
Reviewed
Sep 30, 2025
Last updated
Oct 3, 2025
All versions of the package check-branches are vulnerable to Command Injection.
check-branches is a command-line tool that is interacted with locally, or via CI, to confirm no conflicts exist in git branches.
However, the library follows these conventions which can be abused:
Since a branch name is potentially a user input - as users can create branches remotely via pull requests, or simply due to privileged access to a repository - it can effectively be abused to run any command.
References