← Zuruck zu CVEs
CVE-2026-31861
HIGH8.8
Beschreibung
Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, The /api/user/git-config endpoint constructs shell commands by interpolating user-supplied gitName and gitEmail values into command strings passed to child_process.exec(). The input is placed within double quotes and only " is escaped, but backticks (`), $() command substitution, and \ sequences are all interpreted within double-quoted strings in bash. This allows authenticated attackers to execute arbitrary OS commands via the git configuration endpoint. This vulnerability is fixed in 1.24.0.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht3/11/2026
Zuletzt geandert3/17/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
cloudcli:cloud_cli
Schwachen (CWE)
CWE-94
Referenzen
https://github.com/siteboon/claudecodeui/commit/86c33c1c0cb34176725a38f46960213714fc3e04(security-advisories@github.com)
https://github.com/siteboon/claudecodeui/releases/tag/v1.24.0(security-advisories@github.com)
https://github.com/siteboon/claudecodeui/security/advisories/GHSA-7fv4-fmmc-86g2(security-advisories@github.com)
https://github.com/siteboon/claudecodeui/security/advisories/GHSA-7fv4-fmmc-86g2(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.