CVE-2025-68432: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
AI Analysis
Technical Summary
The vulnerability CVE-2025-68432 affects the Zed code editor, specifically versions before 0.218.2-pre. Zed supports Language Server Protocol (LSP) configurations loaded from a settings.json file located in a project’s .zed subdirectory. The flaw lies in improper neutralization of special shell command elements (CWE-77), allowing an attacker to embed arbitrary shell commands within the LSP configuration. When a user opens a project containing such a malicious settings.json, the embedded commands execute on the host system with the same privileges as the user running Zed. This arbitrary code execution vector is triggered without requiring authentication but does require the user to open the compromised project, making user interaction necessary. The vulnerability has a CVSS v3.1 score of 7.8 (high severity), reflecting its potential to compromise confidentiality, integrity, and availability. The fix, introduced in version 0.218.2-pre, implements a worktree trust mechanism that restricts execution of untrusted LSP configurations, effectively mitigating the risk. No known exploits are currently reported in the wild, but the attack surface is significant given the common use of IDEs and project sharing in development workflows. The vulnerability emphasizes the risk of automatically executing code or commands from project configuration files without validation or trust verification.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to software development teams using the Zed editor. Successful exploitation could lead to arbitrary code execution with user-level privileges, potentially allowing attackers to steal sensitive source code, inject malicious code, or pivot within internal networks. Confidentiality is at risk as attackers could exfiltrate intellectual property or credentials stored on compromised machines. Integrity could be compromised by altering source code or build configurations, leading to supply chain risks. Availability might be impacted if attackers deploy destructive payloads or ransomware. The requirement for user interaction (opening a malicious project) means social engineering or supply chain attacks (e.g., via shared repositories) are likely vectors. European organizations with collaborative development environments, open source contributions, or distributed teams are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk, but the high severity and ease of embedding malicious configurations in project files warrant proactive mitigation.
Mitigation Recommendations
1. Upgrade all Zed editor installations to version 0.218.2-pre or later immediately to benefit from the implemented worktree trust mechanism. 2. Until upgrading, enforce strict policies requiring developers to manually review the contents of any project’s .zed/settings.json file before opening the project in Zed, especially for projects from untrusted sources. 3. Implement endpoint protection solutions capable of detecting suspicious shell command executions originating from IDE processes. 4. Educate developers on the risks of opening untrusted project files and encourage use of sandboxed or isolated environments when testing unknown projects. 5. Use version control and code review processes to detect and prevent malicious configurations from entering shared repositories. 6. Monitor logs for unusual command executions or process behaviors linked to Zed. 7. Consider restricting network access or privileges of developer workstations to limit lateral movement if exploitation occurs. 8. Employ application whitelisting to prevent unauthorized execution of unexpected commands or scripts triggered by the IDE.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium, Denmark
CVE-2025-68432: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed
Description
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-68432 affects the Zed code editor, specifically versions before 0.218.2-pre. Zed supports Language Server Protocol (LSP) configurations loaded from a settings.json file located in a project’s .zed subdirectory. The flaw lies in improper neutralization of special shell command elements (CWE-77), allowing an attacker to embed arbitrary shell commands within the LSP configuration. When a user opens a project containing such a malicious settings.json, the embedded commands execute on the host system with the same privileges as the user running Zed. This arbitrary code execution vector is triggered without requiring authentication but does require the user to open the compromised project, making user interaction necessary. The vulnerability has a CVSS v3.1 score of 7.8 (high severity), reflecting its potential to compromise confidentiality, integrity, and availability. The fix, introduced in version 0.218.2-pre, implements a worktree trust mechanism that restricts execution of untrusted LSP configurations, effectively mitigating the risk. No known exploits are currently reported in the wild, but the attack surface is significant given the common use of IDEs and project sharing in development workflows. The vulnerability emphasizes the risk of automatically executing code or commands from project configuration files without validation or trust verification.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to software development teams using the Zed editor. Successful exploitation could lead to arbitrary code execution with user-level privileges, potentially allowing attackers to steal sensitive source code, inject malicious code, or pivot within internal networks. Confidentiality is at risk as attackers could exfiltrate intellectual property or credentials stored on compromised machines. Integrity could be compromised by altering source code or build configurations, leading to supply chain risks. Availability might be impacted if attackers deploy destructive payloads or ransomware. The requirement for user interaction (opening a malicious project) means social engineering or supply chain attacks (e.g., via shared repositories) are likely vectors. European organizations with collaborative development environments, open source contributions, or distributed teams are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk, but the high severity and ease of embedding malicious configurations in project files warrant proactive mitigation.
Mitigation Recommendations
1. Upgrade all Zed editor installations to version 0.218.2-pre or later immediately to benefit from the implemented worktree trust mechanism. 2. Until upgrading, enforce strict policies requiring developers to manually review the contents of any project’s .zed/settings.json file before opening the project in Zed, especially for projects from untrusted sources. 3. Implement endpoint protection solutions capable of detecting suspicious shell command executions originating from IDE processes. 4. Educate developers on the risks of opening untrusted project files and encourage use of sandboxed or isolated environments when testing unknown projects. 5. Use version control and code review processes to detect and prevent malicious configurations from entering shared repositories. 6. Monitor logs for unusual command executions or process behaviors linked to Zed. 7. Consider restricting network access or privileges of developer workstations to limit lateral movement if exploitation occurs. 8. Employ application whitelisting to prevent unauthorized execution of unexpected commands or scripts triggered by the IDE.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T15:29:39.380Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69433603058703ef3fd0211d
Added to database: 12/17/2025, 11:00:19 PM
Last enriched: 12/25/2025, 12:06:11 AM
Last updated: 2/7/2026, 1:12:08 PM
Views: 144
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.