Home Atlassian CVE-2025-22165
Back to Atlassian

CVE-2025-22165

Sourcetree for Mac - Sourcetree Application

Atlassian CVSS 7.3 Updated April 6, 2026

Executive Risk Summary

"A Medium severity Arbitrary Code Execution (ACE) vulnerability exists in Sourcetree for Mac version 4.2.8, allowing a locally authenticated attacker to execute arbitrary code with high impact to confidentiality, integrity, and availability. Users are recommended to upgrade to the latest version to mitigate this vulnerability."

Anticipated Attack Path

  1. 1. Initial Exploitation: Attacker gains local access to the system
  2. 2. Privilege Escalation: Attacker exploits the ACE vulnerability to execute arbitrary code
  3. 3. Lateral Movement: Attacker potentially moves laterally within the system or network

Am I Vulnerable?

  • Verify Sourcetree for Mac version is 4.2.8 or later
  • Check for any suspicious activity or code execution on the system
  • Upgrade to the latest version of Sourcetree for Mac

Operational Audit Arsenal

Target Type Application
Target Asset Sourcetree
Standard Path /Applications/Sourcetree.app

Manual Verification Required

This is a non-Windows asset (Atlassian). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only updates the Sourcetree application

Internal Work Notes

CVE-2025-22165: Sourcetree for Mac ACE vulnerability - upgrade to latest version to prevent arbitrary code execution

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Atlassian Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.