Sourcetree Atlassian Sourcetree

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Atlassian Sourcetree.

By the Year

In 2025 there have been 0 vulnerabilities in Atlassian Sourcetree. Last year, in 2024 Sourcetree had 2 security vulnerabilities published. Right now, Sourcetree is on track to have less security vulnerabilities in 2025 than it did last year.

Year Vulnerabilities Average Score
2025 0 0.00
2024 2 8.30
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 4 8.80
2018 5 8.86

It may take a day or so for new Sourcetree vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Atlassian Sourcetree Security Vulnerabilities

Sourcetree Remote Code Execution Vulnerability

CVE-2024-21697 8.8 - High - November 19, 2024

This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9 Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20 See the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]). This vulnerability was reported via our Penetration Testing program.

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows

CVE-2023-22514 7.8 - High - January 16, 2024

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Sourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15 See the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives). This vulnerability was reported via our Penetration Testing program.

An argument injection vulnerability in Atlassian Sourcetree for Windows's URI handlers, in all versions prior to 3.1.3

CVE-2019-11582 8.8 - High - June 14, 2019

An argument injection vulnerability in Atlassian Sourcetree for Windows's URI handlers, in all versions prior to 3.1.3, allows remote attackers to gain remote code execution through the use of a crafted URI.

Argument Injection

There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1

CVE-2018-20234 8.8 - High - March 08, 2019

There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.

Argument Injection

There was an argument injection vulnerability in Atlassian Sourcetree for Windows from version 0.5a before version 3.0.15

CVE-2018-20235 8.8 - High - March 08, 2019

There was an argument injection vulnerability in Atlassian Sourcetree for Windows from version 0.5a before version 3.0.15 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.

There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling

CVE-2018-20236 8.8 - High - March 08, 2019

There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system.

Command Injection

There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0

CVE-2018-13396 8.8 - High - November 05, 2018

There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.

There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0

CVE-2018-13397 8.8 - High - November 05, 2018

There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.

There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories

CVE-2018-13385 9.8 - Critical - July 24, 2018

There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability.

Argument Injection

There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories

CVE-2018-13386 8.1 - High - July 24, 2018

There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability.

Argument Injection

There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted

CVE-2018-5226 8.8 - High - April 25, 2018

There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted. An attacker with permission to create a tag on a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. All versions of Sourcetree for Windows before 2.5.5.0 are affected by this vulnerability.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Atlassian Sourcetree or by Atlassian? Click the Watch button to subscribe.

Atlassian
Vendor

subscribe