Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68432: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed

0
High
VulnerabilityCVE-2025-68432cvecve-2025-68432cwe-77
Published: Wed Dec 17 2025 (12/17/2025, 22:45:42 UTC)
Source: CVE Database V5
Vendor/Project: zed-industries
Product: zed

Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:15:26 UTC

Technical Analysis

CVE-2025-68432 is a command injection vulnerability classified under CWE-77 affecting the Zed code editor prior to version 0.218.2-pre. Zed loads Language Server Protocol (LSP) configurations from a project-specific settings file located at .zed/settings.json. These configurations can include shell commands that are executed on the host system with the privileges of the user running the IDE. The vulnerability arises because Zed does not properly sanitize or neutralize special shell elements within these LSP configurations, allowing an attacker to embed arbitrary shell commands. When a user opens a project containing a malicious settings.json file, these commands execute, leading to arbitrary code execution. Exploitation requires the attacker to seed the project directory with a malicious settings.json file and the user to open the project in Zed without inspecting the file contents. The vulnerability has a CVSS 3.1 score of 7.8, indicating high severity, with attack vector local, high attack complexity, no privileges required, user interaction required, and impacts on confidentiality, integrity, and availability. The fix introduced in version 0.218.2-pre implements a worktree trust mechanism that restricts loading configurations from untrusted project directories, mitigating the risk. No known exploits are reported in the wild yet, but the vulnerability poses a significant risk due to the ability to execute arbitrary code with user privileges.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to software development teams and environments where Zed is used as the IDE. Successful exploitation can lead to arbitrary code execution with the same privileges as the user running Zed, potentially compromising sensitive source code, intellectual property, and internal systems. Attackers could use this to install malware, exfiltrate data, or move laterally within networks. Since the attack requires local access to plant malicious project files or trick users into opening compromised projects, insider threats or supply chain attacks (e.g., malicious code repositories) are plausible vectors. The impact extends to confidentiality, integrity, and availability of development environments and potentially connected systems. Given the high adoption of modern IDEs in European tech sectors, organizations that do not upgrade or enforce strict project file review policies are at elevated risk. This could disrupt development workflows and lead to broader organizational compromise.

Mitigation Recommendations

1. Upgrade all Zed IDE installations to version 0.218.2-pre or later, which includes the worktree trust mechanism to prevent loading untrusted LSP configurations. 2. Implement strict policies requiring developers to review and validate the contents of .zed/settings.json files before opening projects, especially those sourced externally or from untrusted repositories. 3. Employ endpoint security solutions that monitor and restrict unauthorized file modifications in development directories. 4. Use sandboxing or containerization for development environments to limit the impact of potential code execution. 5. Educate developers about the risks of opening projects from unknown or untrusted sources and encourage the use of version control systems with signed commits to verify project integrity. 6. Monitor for unusual process executions or shell command invocations originating from the Zed IDE processes. 7. Consider network segmentation to limit lateral movement if a developer machine is compromised. 8. Regularly audit and update development tools to incorporate security patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T15:29:39.380Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69433603058703ef3fd0211d

Added to database: 12/17/2025, 11:00:19 PM

Last enriched: 12/17/2025, 11:15:26 PM

Last updated: 12/18/2025, 6:37:35 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats