gitblit CVE Vulnerabilities & Metrics

Focus on gitblit vulnerabilities and metrics.

Last updated: 11 Sep 2025, 22:25 UTC

About gitblit Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with gitblit. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total gitblit CVEs: 4
Earliest CVE date: 21 May 2022, 21:15 UTC
Latest CVE date: 27 Aug 2025, 17:15 UTC

Latest CVE reference: CVE-2025-50977

Rolling Stats

30-day Count (Rolling): 2
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical gitblit CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.12

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 1
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS gitblit CVEs

These are the five CVEs with the highest CVSS scores for gitblit, sorted by severity first and recency.

All CVEs for gitblit

CVE-2025-50977 gitblit vulnerability CVSS: 0 27 Aug 2025, 17:15 UTC

A template injection vulnerability leading to reflected cross-site scripting (XSS) has been identified in version 1.7.1, requiring authenticated admin access for exploitation. The vulnerability exists in the 'r' parameter and allows attackers to inject malicious Angular expressions that execute JavaScript code in the context of the application. The flaw can be exploited through GET requests to the summary endpoint as well as POST requests to specific Wicket interface endpoints, though the GET method provides easier weaponization. This vulnerability enables authenticated administrators to execute arbitrary client-side code, potentially leading to session hijacking, data theft, or further privilege escalation attacks.

CVE-2025-50978 gitblit vulnerability CVSS: 0 27 Aug 2025, 16:15 UTC

In Gitblit v1.7.1, a reflected cross-site scripting (XSS) vulnerability exists in the way repository path names are handled. By injecting a specially crafted path payload an attacker can cause arbitrary JavaScript to execute when a victim views the manipulated URL. This flaw stems from insufficient input sanitization of filename elements.

CVE-2022-31268 gitblit vulnerability CVSS: 5.0 21 May 2022, 21:15 UTC

A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).

CVE-2022-31267 gitblit vulnerability CVSS: 7.5 21 May 2022, 21:15 UTC

Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext 'attacker@example.com\n\trole = "#admin"' value.