CVE-2026-47090: Improper Neutralization of Escape, Meta, or Control Sequences in jarrodwatts claude-hud
CVE-2026-47090 is a vulnerability in the jarrodwatts claude-hud project (version 0. 0. 12 and earlier) where terminal hyperlink escape sequences are constructed using unfiltered current working directory and branch URL values. This allows attackers to inject arbitrary ANSI escape codes into terminal sessions, potentially altering text colors, forging prompts, writing to the clipboard, or triggering outbound HTTP requests when hyperlinks are clicked. The vulnerability has a low CVSS score of 2. 4 and no known exploits in the wild. A patch was introduced in commit 234d9aa, but no official vendor advisory or patch link is provided in the data. The product is not a cloud service, and remediation level is not specified.
AI Analysis
Technical Summary
Claude HUD versions up to 0.0.12 improperly neutralize escape, meta, or control sequences when constructing OSC 8 terminal hyperlink escape sequences. Specifically, it uses raw current working directory and branch URL values without stripping control characters or encoding embedded values. This flaw enables attackers to inject arbitrary ANSI codes, including ESC+backslash sequences, which can manipulate terminal display properties, forge prompts, write clipboard data via OSC 52 sequences, or cause outbound HTTP requests when users click on crafted hyperlinks. The vulnerability is identified as CVE-2026-47090 with a CVSS 4.0 score of 2.4 (low severity). A fix was committed (234d9aa), but no official patch advisory is provided in the input data.
Potential Impact
The vulnerability allows attackers with limited privileges and user interaction to inject ANSI escape sequences into terminal sessions. This can lead to visual deception such as forged prompts or altered text colors, clipboard manipulation, or unintended outbound HTTP requests when hyperlinks are clicked. The impact is considered low severity due to the requirement for user interaction and limited scope of exploitation. There are no known exploits in the wild at this time.
Mitigation Recommendations
A patch addressing this vulnerability was committed in commit 234d9aa. However, no official vendor advisory or patch link is provided in the available data. Users of claude-hud should update to the fixed version that includes this commit to mitigate the issue. Since the product is not a cloud service, remediation depends on user action to apply the patch. Patch status is not yet confirmed by a vendor advisory; users should verify the fix and monitor official sources for updates.
CVE-2026-47090: Improper Neutralization of Escape, Meta, or Control Sequences in jarrodwatts claude-hud
Description
CVE-2026-47090 is a vulnerability in the jarrodwatts claude-hud project (version 0. 0. 12 and earlier) where terminal hyperlink escape sequences are constructed using unfiltered current working directory and branch URL values. This allows attackers to inject arbitrary ANSI escape codes into terminal sessions, potentially altering text colors, forging prompts, writing to the clipboard, or triggering outbound HTTP requests when hyperlinks are clicked. The vulnerability has a low CVSS score of 2. 4 and no known exploits in the wild. A patch was introduced in commit 234d9aa, but no official vendor advisory or patch link is provided in the data. The product is not a cloud service, and remediation level is not specified.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Claude HUD versions up to 0.0.12 improperly neutralize escape, meta, or control sequences when constructing OSC 8 terminal hyperlink escape sequences. Specifically, it uses raw current working directory and branch URL values without stripping control characters or encoding embedded values. This flaw enables attackers to inject arbitrary ANSI codes, including ESC+backslash sequences, which can manipulate terminal display properties, forge prompts, write clipboard data via OSC 52 sequences, or cause outbound HTTP requests when users click on crafted hyperlinks. The vulnerability is identified as CVE-2026-47090 with a CVSS 4.0 score of 2.4 (low severity). A fix was committed (234d9aa), but no official patch advisory is provided in the input data.
Potential Impact
The vulnerability allows attackers with limited privileges and user interaction to inject ANSI escape sequences into terminal sessions. This can lead to visual deception such as forged prompts or altered text colors, clipboard manipulation, or unintended outbound HTTP requests when hyperlinks are clicked. The impact is considered low severity due to the requirement for user interaction and limited scope of exploitation. There are no known exploits in the wild at this time.
Mitigation Recommendations
A patch addressing this vulnerability was committed in commit 234d9aa. However, no official vendor advisory or patch link is provided in the available data. Users of claude-hud should update to the fixed version that includes this commit to mitigate the issue. Since the product is not a cloud service, remediation depends on user action to apply the patch. Patch status is not yet confirmed by a vendor advisory; users should verify the fix and monitor official sources for updates.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-05-18T19:22:26.747Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a0c25c6ec166c07b08770d6
Added to database: 5/19/2026, 8:56:38 AM
Last enriched: 5/19/2026, 8:56:59 AM
Last updated: 5/19/2026, 11:05:50 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.