Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68433: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed

0
High
VulnerabilityCVE-2025-68433cvecve-2025-68433cwe-77
Published: Wed Dec 17 2025 (12/17/2025, 22:47:40 UTC)
Source: CVE Database V5
Vendor/Project: zed-industries
Product: zed

Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:15:09 UTC

Technical Analysis

CVE-2025-68433 is a command injection vulnerability classified under CWE-77 affecting the Zed code editor before version 0.218.2-pre. Zed loads Model Context Protocol (MCP) configurations from a settings.json file located in the .zed subdirectory of a project. The vulnerability stems from improper sanitization of these MCP configurations, allowing an attacker to embed arbitrary shell commands within the settings.json file. When a user opens a project containing such a malicious MCP configuration, the embedded shell commands execute automatically on the host system with the same privileges as the user running the IDE. This execution occurs without any further user interaction beyond opening the project, making it a stealthy and dangerous attack vector. The vulnerability requires local access to the project files or delivery of a malicious project archive. The fix introduced in version 0.218.2-pre involves a worktree trust mechanism that restricts automatic execution of untrusted MCP configurations, mitigating the risk. Until patching, users should manually inspect the contents of .zed/settings.json files before opening projects to avoid triggering malicious commands. The CVSS 3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with attack vector local, attack complexity high, no privileges required, user interaction required, and scope changed due to potential system compromise. No public exploits are known yet, but the vulnerability poses a significant risk to developers and organizations relying on Zed for code editing.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to software development teams using the Zed IDE. Successful exploitation can lead to arbitrary code execution with user-level privileges, potentially allowing attackers to steal sensitive source code, implant backdoors, or disrupt development workflows. The automatic execution upon project opening increases the risk of supply chain attacks where malicious project files are shared or downloaded from untrusted sources. Confidentiality of intellectual property and integrity of codebases are at high risk, and availability may be impacted if attackers deploy destructive payloads. Given the prevalence of collaborative development and open-source projects in Europe, the risk of inadvertently opening malicious projects is non-trivial. Organizations with lax controls on project file origins or insufficient user training are particularly vulnerable. The lack of known exploits in the wild suggests a window for proactive mitigation, but the high severity demands urgent attention to prevent potential targeted attacks or insider threats exploiting this flaw.

Mitigation Recommendations

1. Upgrade all Zed IDE installations to version 0.218.2-pre or later immediately to benefit from the implemented worktree trust mechanism that blocks automatic execution of untrusted MCP configurations. 2. Until patching is complete, enforce strict policies requiring developers to manually review the contents of .zed/settings.json files before opening any new or untrusted projects. 3. Implement endpoint security controls that monitor and restrict unexpected shell command executions originating from the Zed process. 4. Educate development teams about the risks of opening projects from unverified sources and encourage use of secure channels for project sharing. 5. Use file integrity monitoring on project directories to detect unauthorized modifications to MCP configuration files. 6. Consider sandboxing or running the IDE in isolated environments when opening projects from external or unknown origins to limit potential damage. 7. Maintain up-to-date backups of critical source code repositories to enable recovery in case of compromise. 8. Monitor security advisories from Zed and related communities for any emerging exploit reports or additional patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T15:43:01.351Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69433603058703ef3fd02122

Added to database: 12/17/2025, 11:00:19 PM

Last enriched: 12/17/2025, 11:15:09 PM

Last updated: 12/18/2025, 6:37:23 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats