Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27967: CWE-59: Improper Link Resolution Before File Access ('Link Following') in zed-industries zed

0
High
VulnerabilityCVE-2026-27967cvecve-2026-27967cwe-59
Published: Wed Feb 25 2026 (02/25/2026, 23:33:21 UTC)
Source: CVE Database V5
Vendor/Project: zed-industries
Product: zed

Description

Zed, a code editor, has a symlink escape vulnerability in versions prior to 0.225.9 in Agent file tools (`read_file`, `edit_file`). It allows reading and writing files **outside the project directory** when a project contains symbolic links pointing to external paths. This bypasses the intended workspace boundary and privacy protections (`file_scan_exclusions`, `private_files`), potentially leaking sensitive user data to the LLM. Version 0.225.9 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:46:02 UTC

Technical Analysis

CVE-2026-27967 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the zed code editor developed by zed-industries. The vulnerability arises from improper handling of symbolic links within the Agent file tools, specifically the `read_file` and `edit_file` functions. When a project directory contains symbolic links that point to files or directories outside the project workspace, zed incorrectly follows these links, allowing file operations beyond the intended sandbox boundary. This behavior bypasses security mechanisms designed to restrict file access such as `file_scan_exclusions` and `private_files`, which are meant to protect sensitive files from being accessed or leaked. As a result, an attacker or malicious user with local access and the ability to create or manipulate project files can cause zed to read or write arbitrary files on the host system, potentially exposing sensitive data to the integrated large language model (LLM) or corrupting files. The vulnerability requires user interaction (e.g., opening or editing a project containing malicious symlinks) but does not require elevated privileges. The CVSS v3.1 score is 7.1 (high severity), reflecting high confidentiality and integrity impact, low attack complexity, no privileges required, and user interaction needed. The vulnerability was publicly disclosed on February 25, 2026, and fixed in zed version 0.225.9. No known exploits in the wild have been reported to date.

Potential Impact

This vulnerability poses a significant risk to organizations using vulnerable versions of the zed code editor, especially those handling sensitive or proprietary code and data. By exploiting the symlink escape, attackers can access or modify files outside the project directory, potentially leaking confidential information such as credentials, configuration files, or intellectual property to the LLM or other components. This undermines data confidentiality and integrity, which can lead to data breaches, intellectual property theft, or sabotage of critical files. Since the vulnerability requires local access and user interaction, the threat is more pronounced in environments where users may open untrusted projects or where attackers have some foothold on the system. The bypass of workspace boundary protections also weakens trust in the editor’s security model, potentially exposing organizations to compliance and privacy risks. Although availability is not impacted, the confidentiality and integrity risks are substantial, especially in development environments integrated with AI tools that may inadvertently process sensitive data. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, particularly as attackers may develop exploits following public disclosure.

Mitigation Recommendations

Organizations should immediately upgrade all instances of the zed code editor to version 0.225.9 or later, which contains the fix for this vulnerability. Until the upgrade is applied, users should avoid opening projects containing untrusted or external symbolic links and refrain from editing files through the Agent file tools that could be manipulated via symlinks. Implement strict controls on project directory contents, including scanning for and removing suspicious symbolic links that point outside the workspace. Employ endpoint security solutions to monitor and restrict unauthorized file system modifications and symlink creations. Educate developers and users about the risks of opening untrusted projects and the importance of applying security updates promptly. Additionally, review and harden privacy settings related to `file_scan_exclusions` and `private_files` to minimize sensitive data exposure. Consider isolating development environments or using containerization to limit the impact of potential symlink escape exploits. Finally, monitor vendor advisories and threat intelligence feeds for any emerging exploit activity related to this CVE.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:24:57.793Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f8c2fb7ef31ef0b6c21ce

Added to database: 2/25/2026, 11:56:31 PM

Last enriched: 3/5/2026, 9:46:02 AM

Last updated: 4/11/2026, 6:13:02 PM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses