CVE-2025-31130

MEDIUM

gitoxide <0.42.0 - Info Disclosure

Title source: llm
STIX 2.1

Description

gitoxide is an implementation of git written in Rust. Before 0.42.0, gitoxide uses SHA-1 hash implementations without any collision detection, leaving it vulnerable to hash collision attacks. gitoxide uses the sha1_smol or sha1 crate, both of which implement standard SHA-1 without any mitigations for collision attacks. This means that two distinct Git objects with colliding SHA-1 hashes would break the Git object model and integrity checks when used with gitoxide. This vulnerability is fixed in 0.42.0.

Scores

CVSS v3 6.8
EPSS 0.0006
EPSS Percentile 17.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-328
Status published
Products (28)
crates.io/gitoxide 0 - 0.42.0crates.io
crates.io/gitoxide-core 0 - 0.46.0crates.io
crates.io/gix 0 - 0.71.0crates.io
crates.io/gix-archive 0 - 0.20.0crates.io
crates.io/gix-blame 0 - 0.1.0crates.io
crates.io/gix-commitgraph 0 - 0.27.0crates.io
crates.io/gix-config 0 - 0.44.0crates.io
crates.io/gix-diff 0 - 0.51.0crates.io
crates.io/gix-dir 0 - 0.13.0crates.io
crates.io/gix-discover 0 - 0.39.0crates.io
... and 18 more
Published Apr 04, 2025
Tracked Since Feb 18, 2026