The vulnerability root cause was improper argument handling in git command execution. The GitHub PR #21463 shows critical changes to argument sanitization in these files:
- In repo_commit.go, ref parameters were made to use AddDynamicArguments with sanitization
- In command.go, the command execution was modified to use ProperArgs for safe argument handling
These changes directly correlate to CWE-88 (Argument Injection) by addressing unsanitized input in git command arguments. The files and functions mentioned in the security patches match the vulnerability description of mishandled git ref parameters.