The package prior to v1.11.0 is vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way such that additional flags can be set. The additional flags can be used to perform a command injection.
{
"severity": "CRITICAL",
"nvd_published_at": "2022-04-19T17:15:00Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-88"
],
"github_reviewed_at": "2022-04-28T21:13:22Z"
}