Impact
The vulnerability resides in the /api/user/git-config endpoint of Cloud CLI UI, which builds shell commands by interpolating user-supplied gitName and gitEmail values into child_process.exec() calls. Because only the double-quote character is escaped, backticks, $(), and backslashes are interpreted by Bash, enabling an authenticated attacker to inject and execute arbitrary OS commands. This results in remote code execution, giving the attacker full control over the system where the UI runs.
Affected Systems
The issue affects the Siteboon:Claudecodeui product, specifically all releases prior to version 1.24.0. Any installation of the desktop or mobile UI that has not been upgraded to 1.24.0 or later is vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, and the EPSS score of less than 1% suggests the likelihood of widespread exploitation is currently low. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authentication to the API, so an attacker must first compromise a legitimate user account. Once authenticated, the attacker can send a crafted request to the git-config endpoint to execute arbitrary commands on the host machine.
OpenCVE Enrichment
Github GHSA