Skip to main content

CVE-2025-59532: CWE-20: Improper Input Validation in openai codex

High
VulnerabilityCVE-2025-59532cvecve-2025-59532cwe-20
Published: Mon Sep 22 2025 (09/22/2025, 20:26:42 UTC)
Source: CVE Database V5
Vendor/Project: openai
Product: codex

Description

Codex CLI is a coding agent from OpenAI that runs locally. In versions 0.2.0 to 0.38.0, due to a bug in the sandbox configuration logic, Codex CLI could treat a model-generated cwd as the sandbox’s writable root, including paths outside of the folder where the user started their session. This logic bypassed the intended workspace boundary and enables arbitrary file writes and command execution where the Codex process has permissions - this did not impact the network-disabled sandbox restriction. This issue has been patched in Codex CLI 0.39.0 that canonicalizes and validates that the boundary used for sandbox policy is based on where the user started the session, and not the one generated by the model. Users running 0.38.0 or earlier should update immediately via their package manager or by reinstalling the latest Codex CLI to ensure sandbox boundaries are enforced. If using the Codex IDE extension, users should immediately update to 0.4.12 for a fix of the sandbox issue.

AI-Powered Analysis

AILast updated: 09/22/2025, 20:35:51 UTC

Technical Analysis

CVE-2025-59532 is a high-severity vulnerability affecting OpenAI's Codex CLI versions 0.2.0 through 0.38.0. Codex CLI is a local coding agent that executes code generation and related tasks within a sandboxed environment to restrict file system and command execution capabilities. The vulnerability arises from improper input validation (CWE-20) in the sandbox configuration logic. Specifically, the sandbox incorrectly treats the current working directory (cwd) generated by the Codex model as the writable root of the sandbox. Because this cwd can be manipulated by the model output, it can point outside the intended workspace boundary, effectively bypassing sandbox restrictions. This flaw enables an attacker to perform arbitrary file writes and execute commands with the permissions of the Codex process, potentially compromising the host system. Notably, the network-disabled sandbox restriction remains intact, so network-based containment is unaffected. The issue was patched in Codex CLI version 0.39.0 by canonicalizing and validating the sandbox boundary to ensure it is based strictly on the user's session start directory rather than the model-generated cwd. Users of affected versions are strongly advised to update immediately, including those using the Codex IDE extension, which received a fix in version 0.4.12. The vulnerability has a CVSS 4.0 score of 8.6, reflecting its high impact on confidentiality, integrity, and availability, with low attack complexity and no required privileges or user interaction. No known exploits are currently reported in the wild. This vulnerability highlights the risks of trusting model-generated inputs for security-critical sandbox boundaries and underscores the importance of strict input validation and boundary enforcement in AI-assisted development tools.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for software development teams and enterprises integrating Codex CLI into their development workflows. Exploitation could lead to unauthorized file system modifications, insertion of malicious code, or execution of arbitrary commands on developer machines or build servers. This can result in source code tampering, leakage of sensitive intellectual property, or compromise of internal networks if the Codex process has elevated permissions. Given that Codex CLI runs locally, the threat is particularly acute in environments where developers have access to sensitive codebases or production deployment scripts. The integrity of software supply chains could be undermined, potentially leading to downstream impacts on software products distributed across Europe. Additionally, organizations subject to strict data protection regulations (e.g., GDPR) may face compliance risks if confidential data is exposed or altered. Although network restrictions remain effective, the local privilege escalation and sandbox escape capabilities make this vulnerability a critical concern for secure development practices in European enterprises.

Mitigation Recommendations

1. Immediate update: All users of Codex CLI versions 0.2.0 to 0.38.0 must upgrade to version 0.39.0 or later. Similarly, users of the Codex IDE extension should update to version 0.4.12 or later. 2. Verify sandbox boundaries: Organizations should audit sandbox configurations to ensure that workspace boundaries are strictly enforced and not influenced by model-generated inputs. 3. Restrict Codex permissions: Run Codex CLI processes with the least privileges necessary, ideally within isolated user accounts or containers to limit the impact of potential exploitation. 4. Monitor file system changes: Implement file integrity monitoring on developer machines and build servers to detect unauthorized modifications. 5. Educate developers: Raise awareness about the risks of using AI coding assistants and the importance of applying security patches promptly. 6. Review CI/CD pipelines: Ensure that automated build and deployment pipelines using Codex do not run with excessive privileges and incorporate security checks to detect anomalous code or commands. 7. Network segmentation: Although network restrictions are not bypassed by this vulnerability, maintaining strict network segmentation can limit lateral movement if a host is compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-17T17:04:20.373Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d1b30dc6427514cac5c458

Added to database: 9/22/2025, 8:35:25 PM

Last enriched: 9/22/2025, 8:35:51 PM

Last updated: 9/23/2025, 12:10:56 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats