CVE-2025-68433: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-68433 affects the Zed code editor, specifically versions prior to 0.218.2-pre. The root cause is improper neutralization of special elements in the Model Context Protocol (MCP) configuration files, which are loaded from the settings.json file located in a project’s .zed subdirectory. These MCP configurations can embed arbitrary shell commands that the IDE executes on the host system with the privileges of the user running Zed. This command injection occurs automatically when a user opens a project containing a malicious MCP configuration, without requiring further user interaction. The vulnerability is classified under CWE-77, indicating command injection due to improper input sanitization. The CVSS v3.1 base score is 7.8, with vector AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H, meaning the attack requires local access, high attack complexity, no privileges but user interaction (opening project), and impacts confidentiality, integrity, and availability with a scope change. The fix implemented in version 0.218.2-pre introduces a worktree trust mechanism, which likely restricts execution of MCP configurations to trusted project directories, mitigating the risk of executing malicious commands. As a temporary workaround, users should manually inspect the contents of the .zed/settings.json file before opening projects, especially those obtained from untrusted sources. No public exploits have been reported yet, but the automatic execution upon project load makes this vulnerability particularly dangerous in environments where developers open multiple third-party projects. The vulnerability affects the development environment and could lead to arbitrary code execution, data compromise, or system disruption.
Potential Impact
For European organizations, the impact of CVE-2025-68433 can be significant, particularly for software development teams using the Zed IDE. Successful exploitation allows arbitrary code execution with user-level privileges, potentially leading to data theft, installation of malware, lateral movement within internal networks, or disruption of development workflows. Confidentiality is at risk as attackers could exfiltrate source code or sensitive project data. Integrity could be compromised by injecting malicious code into projects or altering development tools. Availability could be affected if attackers deploy ransomware or destructive payloads. The automatic execution upon project opening increases the risk of inadvertent compromise, especially in organizations that frequently collaborate on or import external code repositories. Given the high attack complexity and requirement for local access, the threat is more relevant to insider threats or scenarios where attackers can deliver malicious project files to developers. The absence of known exploits reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential legal and reputational consequences of breaches stemming from this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-68433, European organizations should: 1) Immediately upgrade all Zed IDE installations to version 0.218.2-pre or later, which includes the worktree trust mechanism to prevent automatic execution of untrusted MCP configurations. 2) Implement strict policies to restrict opening projects only from trusted sources and verified repositories. 3) Enforce code review and scanning of .zed/settings.json files before opening projects, using automated tools or manual inspection to detect suspicious shell commands. 4) Educate developers about the risks of opening untrusted projects and the importance of verifying project configuration files. 5) Use endpoint protection solutions capable of detecting anomalous shell command executions initiated by the IDE process. 6) Consider running the IDE in a sandboxed or containerized environment to limit the impact of potential exploitation. 7) Monitor logs and system behavior for unusual activity following project openings. 8) Maintain an inventory of development tools and versions to ensure timely patching. These measures go beyond generic advice by focusing on procedural controls, developer awareness, and environment hardening specific to this vulnerability’s exploitation vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-68433: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed
Description
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-68433 affects the Zed code editor, specifically versions prior to 0.218.2-pre. The root cause is improper neutralization of special elements in the Model Context Protocol (MCP) configuration files, which are loaded from the settings.json file located in a project’s .zed subdirectory. These MCP configurations can embed arbitrary shell commands that the IDE executes on the host system with the privileges of the user running Zed. This command injection occurs automatically when a user opens a project containing a malicious MCP configuration, without requiring further user interaction. The vulnerability is classified under CWE-77, indicating command injection due to improper input sanitization. The CVSS v3.1 base score is 7.8, with vector AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H, meaning the attack requires local access, high attack complexity, no privileges but user interaction (opening project), and impacts confidentiality, integrity, and availability with a scope change. The fix implemented in version 0.218.2-pre introduces a worktree trust mechanism, which likely restricts execution of MCP configurations to trusted project directories, mitigating the risk of executing malicious commands. As a temporary workaround, users should manually inspect the contents of the .zed/settings.json file before opening projects, especially those obtained from untrusted sources. No public exploits have been reported yet, but the automatic execution upon project load makes this vulnerability particularly dangerous in environments where developers open multiple third-party projects. The vulnerability affects the development environment and could lead to arbitrary code execution, data compromise, or system disruption.
Potential Impact
For European organizations, the impact of CVE-2025-68433 can be significant, particularly for software development teams using the Zed IDE. Successful exploitation allows arbitrary code execution with user-level privileges, potentially leading to data theft, installation of malware, lateral movement within internal networks, or disruption of development workflows. Confidentiality is at risk as attackers could exfiltrate source code or sensitive project data. Integrity could be compromised by injecting malicious code into projects or altering development tools. Availability could be affected if attackers deploy ransomware or destructive payloads. The automatic execution upon project opening increases the risk of inadvertent compromise, especially in organizations that frequently collaborate on or import external code repositories. Given the high attack complexity and requirement for local access, the threat is more relevant to insider threats or scenarios where attackers can deliver malicious project files to developers. The absence of known exploits reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential legal and reputational consequences of breaches stemming from this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-68433, European organizations should: 1) Immediately upgrade all Zed IDE installations to version 0.218.2-pre or later, which includes the worktree trust mechanism to prevent automatic execution of untrusted MCP configurations. 2) Implement strict policies to restrict opening projects only from trusted sources and verified repositories. 3) Enforce code review and scanning of .zed/settings.json files before opening projects, using automated tools or manual inspection to detect suspicious shell commands. 4) Educate developers about the risks of opening untrusted projects and the importance of verifying project configuration files. 5) Use endpoint protection solutions capable of detecting anomalous shell command executions initiated by the IDE process. 6) Consider running the IDE in a sandboxed or containerized environment to limit the impact of potential exploitation. 7) Monitor logs and system behavior for unusual activity following project openings. 8) Maintain an inventory of development tools and versions to ensure timely patching. These measures go beyond generic advice by focusing on procedural controls, developer awareness, and environment hardening specific to this vulnerability’s exploitation vector.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T15:43:01.351Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69433603058703ef3fd02122
Added to database: 12/17/2025, 11:00:19 PM
Last enriched: 12/25/2025, 12:06:26 AM
Last updated: 2/7/2026, 5:31:44 AM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2075: Improper Access Controls in yeqifu warehouse
MediumCVE-2026-2073: SQL Injection in itsourcecode School Management System
MediumCVE-2026-25845
LowCVE-2026-25844
LowCVE-2026-25843
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.