Ameeba Exploit Tracker

Tracking CVEs, exploits, and zero-days for defensive cybersecurity research.

Ameeba Blog Search
TRENDING · 1 WEEK
Attack Vector
Vendor
Severity

CVE-2025-58355: Arbitrary File Creation or Override Vulnerability in Soft Serve Git Server

Ameeba Chat Store screens
Download Ameeba Chat

Overview

This report details the vulnerability identified as CVE-2025-58355 in the self-hostable Git server, Soft Serve. It affects versions 0.9.1 and below of the software, posing a significant security risk due to the possibility of arbitrary file creation or overriding through its SSH API. This is a matter of grave concern as it could enable an attacker to compromise the system or leak data.

Vulnerability Summary

CVE ID: CVE-2025-58355
Severity: High (7.7 CVSS score)
Attack Vector: Network (via SSH API)
Privileges Required: Low
User Interaction: None
Impact: System compromise, data leakage

Affected Products

Ameeba Chat Icon Escape the Surveillance Era

Most apps won’t tell you the truth.
They’re part of the problem.

Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.

Ameeba Chat gives you a way out.

  • • No phone number
  • • No email
  • • No personal info
  • • Anonymous aliases
  • • End-to-end encrypted

Chat without a trace.

Product | Affected Versions

Soft Serve Git Server | 0.9.1 and below

How the Exploit Works

An attacker can exploit this vulnerability by sending malicious requests over the SSH API. The requests can contain uncontrolled data that can be used to create new files or overwrite existing ones on the system. The lack of proper data validation exacerbates this vulnerability.

Conceptual Example Code

A conceptual example of how the vulnerability might be exploited could look like this:

ssh -p 2222 user@target.example.com 'echo arbitrary_data > /path/to/vulnerable/file'

In this example, the attacker uses SSH to connect to the target server, then uses the echo command to write arbitrary data to a file. The path to the file is specified directly in the command, allowing the attacker to target specific files.

Mitigation Guidance

The most effective way to mitigate this vulnerability is to apply the vendor patch, which is provided in Soft Serve Git Server version 0.10.0. If an immediate update is not possible, deploying a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as a temporary mitigation measure. These tools can help detect and prevent malicious SSH requests from reaching the server. However, these are not long-term solutions, and updating to a patched version is strongly recommended as soon as feasible.

Want to discuss this further? Join the Ameeba Cybersecurity Group Chat.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.
Ameeba Chat