CVE-2025-68432: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
AI Analysis
Technical Summary
CVE-2025-68432 is a command injection vulnerability classified under CWE-77 affecting the Zed code editor prior to version 0.218.2-pre. Zed loads Language Server Protocol (LSP) configurations from a project-specific settings file located at .zed/settings.json. These configurations can include shell commands that are executed on the host system with the privileges of the user running the IDE. The vulnerability arises because Zed does not properly sanitize or neutralize special shell elements within these LSP configurations, allowing an attacker to embed arbitrary shell commands. When a user opens a project containing a malicious settings.json file, these commands execute, leading to arbitrary code execution. Exploitation requires the attacker to seed the project directory with a malicious settings.json file and the user to open the project in Zed without inspecting the file contents. The vulnerability has a CVSS 3.1 score of 7.8, indicating high severity, with attack vector local, high attack complexity, no privileges required, user interaction required, and impacts on confidentiality, integrity, and availability. The fix introduced in version 0.218.2-pre implements a worktree trust mechanism that restricts loading configurations from untrusted project directories, mitigating the risk. No known exploits are reported in the wild yet, but the vulnerability poses a significant risk due to the ability to execute arbitrary code with user privileges.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to software development teams and environments where Zed is used as the IDE. Successful exploitation can lead to arbitrary code execution with the same privileges as the user running Zed, potentially compromising sensitive source code, intellectual property, and internal systems. Attackers could use this to install malware, exfiltrate data, or move laterally within networks. Since the attack requires local access to plant malicious project files or trick users into opening compromised projects, insider threats or supply chain attacks (e.g., malicious code repositories) are plausible vectors. The impact extends to confidentiality, integrity, and availability of development environments and potentially connected systems. Given the high adoption of modern IDEs in European tech sectors, organizations that do not upgrade or enforce strict project file review policies are at elevated risk. This could disrupt development workflows and lead to broader organizational compromise.
Mitigation Recommendations
1. Upgrade all Zed IDE installations to version 0.218.2-pre or later, which includes the worktree trust mechanism to prevent loading untrusted LSP configurations. 2. Implement strict policies requiring developers to review and validate the contents of .zed/settings.json files before opening projects, especially those sourced externally or from untrusted repositories. 3. Employ endpoint security solutions that monitor and restrict unauthorized file modifications in development directories. 4. Use sandboxing or containerization for development environments to limit the impact of potential code execution. 5. Educate developers about the risks of opening projects from unknown or untrusted sources and encourage the use of version control systems with signed commits to verify project integrity. 6. Monitor for unusual process executions or shell command invocations originating from the Zed IDE processes. 7. Consider network segmentation to limit lateral movement if a developer machine is compromised. 8. Regularly audit and update development tools to incorporate security patches promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2025-68432: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed
Description
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
AI-Powered Analysis
Technical Analysis
CVE-2025-68432 is a command injection vulnerability classified under CWE-77 affecting the Zed code editor prior to version 0.218.2-pre. Zed loads Language Server Protocol (LSP) configurations from a project-specific settings file located at .zed/settings.json. These configurations can include shell commands that are executed on the host system with the privileges of the user running the IDE. The vulnerability arises because Zed does not properly sanitize or neutralize special shell elements within these LSP configurations, allowing an attacker to embed arbitrary shell commands. When a user opens a project containing a malicious settings.json file, these commands execute, leading to arbitrary code execution. Exploitation requires the attacker to seed the project directory with a malicious settings.json file and the user to open the project in Zed without inspecting the file contents. The vulnerability has a CVSS 3.1 score of 7.8, indicating high severity, with attack vector local, high attack complexity, no privileges required, user interaction required, and impacts on confidentiality, integrity, and availability. The fix introduced in version 0.218.2-pre implements a worktree trust mechanism that restricts loading configurations from untrusted project directories, mitigating the risk. No known exploits are reported in the wild yet, but the vulnerability poses a significant risk due to the ability to execute arbitrary code with user privileges.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to software development teams and environments where Zed is used as the IDE. Successful exploitation can lead to arbitrary code execution with the same privileges as the user running Zed, potentially compromising sensitive source code, intellectual property, and internal systems. Attackers could use this to install malware, exfiltrate data, or move laterally within networks. Since the attack requires local access to plant malicious project files or trick users into opening compromised projects, insider threats or supply chain attacks (e.g., malicious code repositories) are plausible vectors. The impact extends to confidentiality, integrity, and availability of development environments and potentially connected systems. Given the high adoption of modern IDEs in European tech sectors, organizations that do not upgrade or enforce strict project file review policies are at elevated risk. This could disrupt development workflows and lead to broader organizational compromise.
Mitigation Recommendations
1. Upgrade all Zed IDE installations to version 0.218.2-pre or later, which includes the worktree trust mechanism to prevent loading untrusted LSP configurations. 2. Implement strict policies requiring developers to review and validate the contents of .zed/settings.json files before opening projects, especially those sourced externally or from untrusted repositories. 3. Employ endpoint security solutions that monitor and restrict unauthorized file modifications in development directories. 4. Use sandboxing or containerization for development environments to limit the impact of potential code execution. 5. Educate developers about the risks of opening projects from unknown or untrusted sources and encourage the use of version control systems with signed commits to verify project integrity. 6. Monitor for unusual process executions or shell command invocations originating from the Zed IDE processes. 7. Consider network segmentation to limit lateral movement if a developer machine is compromised. 8. Regularly audit and update development tools to incorporate security patches promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T15:29:39.380Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69433603058703ef3fd0211d
Added to database: 12/17/2025, 11:00:19 PM
Last enriched: 12/17/2025, 11:15:26 PM
Last updated: 12/18/2025, 6:37:35 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68459: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Ruijie Networks Co., Ltd. AP180-PE V3.xx
HighCVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
HighCVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon
HighCVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
CriticalCVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.