Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-47090: Improper Neutralization of Escape, Meta, or Control Sequences in jarrodwatts claude-hud

0
Low
VulnerabilityCVE-2026-47090cvecve-2026-47090
Published: Mon May 18 2026 (05/18/2026, 19:31:33 UTC)
Source: CVE Database V5
Vendor/Project: jarrodwatts
Product: claude-hud

Description

CVE-2026-47090 is a vulnerability in the jarrodwatts claude-hud project (version 0. 0. 12 and earlier) where terminal hyperlink escape sequences are constructed using unfiltered current working directory and branch URL values. This allows attackers to inject arbitrary ANSI escape codes into terminal sessions, potentially altering text colors, forging prompts, writing to the clipboard, or triggering outbound HTTP requests when hyperlinks are clicked. The vulnerability has a low CVSS score of 2. 4 and no known exploits in the wild. A patch was introduced in commit 234d9aa, but no official vendor advisory or patch link is provided in the data. The product is not a cloud service, and remediation level is not specified.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/19/2026, 08:56:59 UTC

Technical Analysis

Claude HUD versions up to 0.0.12 improperly neutralize escape, meta, or control sequences when constructing OSC 8 terminal hyperlink escape sequences. Specifically, it uses raw current working directory and branch URL values without stripping control characters or encoding embedded values. This flaw enables attackers to inject arbitrary ANSI codes, including ESC+backslash sequences, which can manipulate terminal display properties, forge prompts, write clipboard data via OSC 52 sequences, or cause outbound HTTP requests when users click on crafted hyperlinks. The vulnerability is identified as CVE-2026-47090 with a CVSS 4.0 score of 2.4 (low severity). A fix was committed (234d9aa), but no official patch advisory is provided in the input data.

Potential Impact

The vulnerability allows attackers with limited privileges and user interaction to inject ANSI escape sequences into terminal sessions. This can lead to visual deception such as forged prompts or altered text colors, clipboard manipulation, or unintended outbound HTTP requests when hyperlinks are clicked. The impact is considered low severity due to the requirement for user interaction and limited scope of exploitation. There are no known exploits in the wild at this time.

Mitigation Recommendations

A patch addressing this vulnerability was committed in commit 234d9aa. However, no official vendor advisory or patch link is provided in the available data. Users of claude-hud should update to the fixed version that includes this commit to mitigate the issue. Since the product is not a cloud service, remediation depends on user action to apply the patch. Patch status is not yet confirmed by a vendor advisory; users should verify the fix and monitor official sources for updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-05-18T19:22:26.747Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 6a0c25c6ec166c07b08770d6

Added to database: 5/19/2026, 8:56:38 AM

Last enriched: 5/19/2026, 8:56:59 AM

Last updated: 5/19/2026, 11:05:50 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses