CVE-2026-27967: CWE-59: Improper Link Resolution Before File Access ('Link Following') in zed-industries zed
CVE-2026-27967 is a high-severity symlink escape vulnerability in the zed code editor versions prior to 0. 225. 9. It affects the Agent file tools (`read_file`, `edit_file`) by allowing attackers to read and write files outside the intended project directory when symbolic links point to external paths. This bypasses workspace boundary protections and privacy settings, potentially exposing sensitive user data to the integrated large language model (LLM). Exploitation requires local access and user interaction but no privileges. The vulnerability does not impact availability but has high confidentiality and integrity impacts. Version 0. 225. 9 fixes this issue.
AI Analysis
Technical Summary
CVE-2026-27967 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the zed code editor prior to version 0.225.9. The flaw exists in the Agent file tools, specifically the `read_file` and `edit_file` functions, which fail to properly validate symbolic links within project directories. When a project contains symbolic links that point to files or directories outside the project workspace, these functions follow the links and access external files. This behavior circumvents the intended workspace boundary enforcement and privacy mechanisms such as `file_scan_exclusions` and `private_files`. As a result, sensitive files outside the project scope can be read or modified, potentially leaking confidential user data to the integrated large language model (LLM) or allowing unauthorized file modifications. The vulnerability requires local attacker presence with the ability to create or manipulate project files containing symlinks and some user interaction to trigger the file operations. The CVSS 3.1 base score is 7.1 (High), reflecting the vulnerability's significant confidentiality and integrity impact but limited attack vector (local) and requirement for user interaction. No known exploits in the wild have been reported yet. The issue was addressed in zed version 0.225.9 by implementing proper symlink resolution checks to ensure file accesses remain confined within the project directory boundaries.
Potential Impact
The vulnerability allows unauthorized reading and writing of files outside the intended project workspace, which can lead to leakage of sensitive user data, including potentially private credentials, configuration files, or proprietary source code. This compromises confidentiality and integrity of user data managed within the zed editor environment. Organizations relying on zed for development or editing tasks may face data breaches or unauthorized modifications if attackers exploit this flaw. Since the vulnerability requires local access and user interaction, the risk is higher in environments where users may open untrusted projects or files containing malicious symlinks. The exposure of sensitive data to the LLM integrated with zed could also lead to unintended data disclosure or misuse. Although availability is not impacted, the breach of confidentiality and integrity can have severe consequences, including intellectual property theft, compliance violations, and erosion of user trust.
Mitigation Recommendations
1. Upgrade zed to version 0.225.9 or later immediately to apply the official fix that enforces proper symlink resolution and workspace boundary checks. 2. Audit existing project directories for symbolic links that point outside the project workspace and remove or replace unsafe symlinks. 3. Implement strict user policies to avoid opening projects or files from untrusted sources that may contain malicious symlinks. 4. Use file system monitoring tools to detect unusual file access patterns or modifications outside expected directories. 5. Limit local user permissions to reduce the ability to create or manipulate symlinks in sensitive environments. 6. Educate users about the risks of opening projects with external symlinks and encourage cautious handling of third-party code. 7. If feasible, isolate the zed editor environment using containerization or sandboxing to restrict file system access beyond the project directory. 8. Monitor for updates or advisories from zed-industries regarding any further related vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, Netherlands, Sweden
CVE-2026-27967: CWE-59: Improper Link Resolution Before File Access ('Link Following') in zed-industries zed
Description
CVE-2026-27967 is a high-severity symlink escape vulnerability in the zed code editor versions prior to 0. 225. 9. It affects the Agent file tools (`read_file`, `edit_file`) by allowing attackers to read and write files outside the intended project directory when symbolic links point to external paths. This bypasses workspace boundary protections and privacy settings, potentially exposing sensitive user data to the integrated large language model (LLM). Exploitation requires local access and user interaction but no privileges. The vulnerability does not impact availability but has high confidentiality and integrity impacts. Version 0. 225. 9 fixes this issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-27967 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the zed code editor prior to version 0.225.9. The flaw exists in the Agent file tools, specifically the `read_file` and `edit_file` functions, which fail to properly validate symbolic links within project directories. When a project contains symbolic links that point to files or directories outside the project workspace, these functions follow the links and access external files. This behavior circumvents the intended workspace boundary enforcement and privacy mechanisms such as `file_scan_exclusions` and `private_files`. As a result, sensitive files outside the project scope can be read or modified, potentially leaking confidential user data to the integrated large language model (LLM) or allowing unauthorized file modifications. The vulnerability requires local attacker presence with the ability to create or manipulate project files containing symlinks and some user interaction to trigger the file operations. The CVSS 3.1 base score is 7.1 (High), reflecting the vulnerability's significant confidentiality and integrity impact but limited attack vector (local) and requirement for user interaction. No known exploits in the wild have been reported yet. The issue was addressed in zed version 0.225.9 by implementing proper symlink resolution checks to ensure file accesses remain confined within the project directory boundaries.
Potential Impact
The vulnerability allows unauthorized reading and writing of files outside the intended project workspace, which can lead to leakage of sensitive user data, including potentially private credentials, configuration files, or proprietary source code. This compromises confidentiality and integrity of user data managed within the zed editor environment. Organizations relying on zed for development or editing tasks may face data breaches or unauthorized modifications if attackers exploit this flaw. Since the vulnerability requires local access and user interaction, the risk is higher in environments where users may open untrusted projects or files containing malicious symlinks. The exposure of sensitive data to the LLM integrated with zed could also lead to unintended data disclosure or misuse. Although availability is not impacted, the breach of confidentiality and integrity can have severe consequences, including intellectual property theft, compliance violations, and erosion of user trust.
Mitigation Recommendations
1. Upgrade zed to version 0.225.9 or later immediately to apply the official fix that enforces proper symlink resolution and workspace boundary checks. 2. Audit existing project directories for symbolic links that point outside the project workspace and remove or replace unsafe symlinks. 3. Implement strict user policies to avoid opening projects or files from untrusted sources that may contain malicious symlinks. 4. Use file system monitoring tools to detect unusual file access patterns or modifications outside expected directories. 5. Limit local user permissions to reduce the ability to create or manipulate symlinks in sensitive environments. 6. Educate users about the risks of opening projects with external symlinks and encourage cautious handling of third-party code. 7. If feasible, isolate the zed editor environment using containerization or sandboxing to restrict file system access beyond the project directory. 8. Monitor for updates or advisories from zed-industries regarding any further related vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-25T03:24:57.793Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f8c2fb7ef31ef0b6c21ce
Added to database: 2/25/2026, 11:56:31 PM
Last enriched: 2/26/2026, 12:11:09 AM
Last updated: 2/26/2026, 2:55:37 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumCVE-2026-2498: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bulktheme WP Social Meta
MediumCVE-2026-2489: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in readymadeweb TP2WP Importer
MediumCVE-2026-2029: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in livemesh Livemesh Addons for Beaver Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.