Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-44798
Published:May 14, 2026
Updated:May 14, 2026
Impact A user with access to add/change a GitRepository record could use the REST API to directly set the "current_head" field on the record, which was not intended to be user-editable. Doing so could cause Nautobot's local clone(s) of the relevant repository to checkout a commit other than the latest commit on the specified "branch" (resulting in misleading state), or potentially to be unable to make use of the repository at all (until manually remediated) due to the "current_head" pointing to a nonexistent commit hash or malformed value. Patches The issue has been remediated in Nautobot v2.4.33 and 3.1.2. Workarounds Note that many of the same end-result symptoms could be caused by a user with the same level of access simply changing the "branch" or "remote_url" of a GitRepository rather than crafting the "current_head". Administrators are encouraged to carefully review which users are granted permissions to create and modify GitRepository records. References - 2.4.33 (<a href="https://github.com/nautobot/nautobot/commit/9deddfc91ad9260ad17b5e20084e9e2d15be3609">patch</a>) - 3.1.2 (<a href="https://github.com/nautobot/nautobot/commit/c46f97040b2bde4320be36b23577f19a8bcbd8c3">patch</a>)
Affected Packages
https://github.com/nautobot/nautobot.git (GITHUB):
Affected version(s) >=v1.0.0a1 <v2.4.33
Fix Suggestion:
Update to version v2.4.33
https://github.com/nautobot/nautobot.git (GITHUB):
Affected version(s) >=v3.0.0 <v3.1.2
Fix Suggestion:
Update to version v3.1.2
nautobot (PYTHON):
Affected version(s) >=0.0.0 <2.4.33
Fix Suggestion:
Update to version 2.4.33
nautobot (PYTHON):
Affected version(s) >=3.0.0a2 <3.1.2
Fix Suggestion:
Update to version 3.1.2
nautobot (PYTHON):
Affected version(s) >=3.0.0 <3.1.2
Fix Suggestion:
Update to version 3.1.2
Do you need more information?
Contact Us
CVSS v4
Base Score:
7.1
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
HIGH
Weakness Type (CWE)
Exposed Dangerous Method or Function
Modification of Assumed-Immutable Data (MAID)