willitmerge is a command line tool to check if pull requests are mergeable. In versions 0.2.1 and prior, there is a command Injection vulnerability in willitmerge. The vulnerability manifests in this package due to the use of insecure child process execution API (exec) to which it concatenates user input, whether provided to the command-line flag, or is in user control in the target repository. At time of publication, no known fix is public.
References
| Link | Resource |
|---|---|
| https://github.com/shama/willitmerge/blob/2fe91d05191fb05ac6da685828d109a3a5885028/lib/willitmerge.js#L189-L197 | Product |
| https://github.com/shama/willitmerge/security/advisories/GHSA-j9wj-m24m-7jj6 | Exploit Vendor Advisory |
| https://github.com/shama/willitmerge/security/advisories/GHSA-j9wj-m24m-7jj6 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-11-29 02:15
Updated : 2025-12-19 15:52
NVD link : CVE-2025-66219
Mitre link : CVE-2025-66219
CVE.ORG link : CVE-2025-66219
JSON object : View
Products Affected
dontkry
- willitmerge
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
