Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-47090— Claude HUD 0.0.12 Terminal Injection via OSC 8 Hyperlinks

CVSS 4.6 · Medium EPSS 0.01% · P2

Affected Version Matrix 2

VendorProductVersion RangeStatus
jarrodwattsclaude-hud≤ 0.0.12affected
234d9aad919b51326a43bcf90b45ae35c23afc30unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-47090

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Claude HUD 0.0.12 Terminal Injection via OSC 8 Hyperlinks
Source: NVD (National Vulnerability Database)
Vulnerability Description
Claude HUD through 0.0.12, patched in commit 234d9aa, constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without stripping control characters or encoding embedded values, allowing attackers to inject arbitrary ANSI codes into terminal sessions. Attackers can embed ESC+backslash sequences in the current working directory or branch URL to execute malicious ANSI codes including text color changes, forged prompts, and OSC 52 clipboard writes, or trigger outbound HTTP requests to attacker-controlled remotes when hyperlinks are clicked.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
转义、元或控制序列转义处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Claude HUD 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Claude HUD是Jarrod Watts个人开发者的一个显示上下文使用、工具状态和进度的Claude Code插件。 Claude HUD 0.0.12及之前版本存在安全漏洞,该漏洞源于使用原始cwd和branchUrl值构建OSC 8终端超链接转义序列时未剥离控制字符或编码嵌入值,可能导致攻击者将任意ANSI代码注入终端会话。攻击者可以在当前工作目录或分支URL中嵌入ESC+反斜杠序列,执行恶意ANSI代码包括文本颜色更改、伪造提示和OSC 52剪贴板写入,或触发指向攻击者控制远程的出站HTTP请
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
jarrodwattsclaude-hud 0 ~ 0.0.12 -

II. Public POCs for CVE-2026-47090

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-47090

登录查看更多情报信息。

Same Patch Batch · jarrodwatts · 2026-05-18 · 3 CVEs total

CVE-2026-470927.8 HIGHClaude HUD 0.0.12 Arbitrary Command Execution via COMSPEC Environment Variable
CVE-2026-470913.3 LOWClaude HUD 0.0.12 Path Traversal via transcript_path

IV. Related Vulnerabilities

V. Comments for CVE-2026-47090

No comments yet


Leave a comment