| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-27976 | Zed Extension Sandbox Escape via Tar Symlink Following | zed-industries | zed | High | 8.8 | 2026-02-25 23:34:40 | Deep Dive |
| CVE-2026-27967 | Symlink Escape in Agent File Tools | zed-industries | zed | High | 7.1 | 2026-02-25 23:33:21 | Deep Dive |
| CVE-2026-27800 | Zed has Zip Slip Path Traversal in Extension Archive Extraction | zed-industries | zed | High | 7.4 | 2026-02-25 23:25:45 | Deep Dive |
| CVE-2026-25805 | Zed does not show Parameter Values for MCP Tool Calls. Users cannot detect tool poisoning. | zed-industries | zed | Medium | 6.4 | 2026-02-10 17:27:49 | Deep Dive |
| CVE-2025-68433 | Zed IDE MCP Context Server Configuration Arbitrary Code Execution | zed-industries | zed | High | 7.7 | 2025-12-17 22:47:41 | Deep Dive |
| CVE-2025-68432 | Zed IDE LSP Binary Configuration Arbitrary Code Execution | zed-industries | zed | High | 7.7 | 2025-12-17 22:45:42 | Deep Dive |
| CVE-2025-55012 | Zed AI Agent Remote Code Execution | zed-industries | zed | - | - | 2025-08-11 21:25:40 | Deep Dive |