Back

Critical Remote Code Execution Vulnerability in GitBucket Disclosed

Severity: High (Score: 76.5)

Sources: github.com, Cve.Tools, cveawg.mitre.org, Lyrie.Ai

Published: 2026-05-18 · Updated: 2026-05-19

Keywords: cve-2018-25332, critical, gitbucket, contains, unauthenticated, remote, code

Severity indicators: critical, ot, CVE:CVE-2018-25332, CVE:CVE-2018-25332, CVE:CVE-2018-25332

Summary

A critical vulnerability (CVE-2018-25332) has been identified in GitBucket version 4.23.1, allowing unauthenticated remote code execution. Attackers can exploit weak secret token generation and insecure file upload functionality to execute arbitrary commands. The attack vector involves brute-forcing the Blowfish encryption key and uploading malicious JAR plugins via the git-lfs endpoint. This vulnerability has been validated by three independent sources prior to publication. Organizations using GitBucket are urged to assess their systems for this vulnerability. The flaw was published on May 17, 2026, and poses a significant risk to affected users. Key Points: • CVE-2018-25332 allows unauthenticated remote code execution in GitBucket 4.23.1. • Attackers can exploit weak token generation and insecure file uploads to execute commands. • Three independent sources confirmed the vulnerability before its public disclosure.

Detailed Analysis

**Impact** GitBucket version 4.23.1 users are affected by an unauthenticated remote code execution vulnerability. This impacts organizations using GitBucket for source code management, potentially exposing development environments globally. Successful exploitation allows arbitrary command execution, risking system compromise, data theft, and disruption of software development operations. No specific sectors or geographic regions are detailed in the sources. **Technical Details** The vulnerability (CVE-2018-25332, CVSS 9.8) exploits weak secret token generation and insecure file upload functionality. Attackers can brute-force the Blowfish encryption key, upload malicious JAR plugins via the git-lfs endpoint, and execute system commands through an exposed exploit endpoint. The attack chain includes initial access via unauthenticated endpoints and execution of arbitrary commands. No specific malware or IOCs are provided. **Recommended Response** Apply the latest GitBucket patch or upgrade beyond version 4.23.1 immediately to remediate the vulnerability. Monitor network traffic for unusual git-lfs endpoint activity and attempts to access exploit endpoints. Harden configurations to restrict unauthenticated access and implement rate limiting to mitigate brute-force attempts. In absence of detailed IOCs, continuous monitoring for anomalous command execution on affected systems is advised.

Source articles (4)

  • CVE-2018-25332 (CRITICAL) — Cve.Tools · 2026-05-17
    GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file upload…
  • GitHub Advisory — github.com · 2026-05-18
  • CVE 2018 25332 — cveawg.mitre.org · 2026-05-18
  • CRITICAL: CVE-2018-25332 (CVSS 9.8) — multiple products — Lyrie.Ai · 2026-05-17
    GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file upload…

Timeline

  • 2026-05-17 — CVE-2018-25332 published: GitBucket 4.23.1 vulnerability disclosed, enabling remote code execution through weak token generation.
  • 2026-05-17 — Vulnerability confirmed by multiple sources: Three independent sources validated the existence and severity of the vulnerability before publication.

CVEs

  • CVE-2018-25332

Related entities

  • Brute Force (Attack Type)
  • Zero-day Exploit (Attack Type)
  • CWE-287 - Improper Authentication (Cwe)
  • Cwe-434 - Unrestricted Upload Of File With Dangerous Type (Cwe)
  • T1059 - Command and Scripting Interpreter (Mitre Attack)
  • T1110 - Brute Force (Mitre Attack)
  • T1203 - Exploitation for Client Execution (Mitre Attack)
  • GitBucket (Platform)
  • Git-lfs (Tool)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed