Impact
Cloud CLI (Claude Code UI) allows authenticated attackers to execute arbitrary OS commands through command injection. The vulnerability arises because multiple Git‑related API endpoints use execAsync() with string interpolation of user‑controlled parameters (file, branch, message, commit). This is a classic CWE‑78 vulnerability leading to Remote Code Execution.
Affected Systems
The affected product is the Siteboon Cloud CLI (Claude Code UI) before version 1.24.0. The vulnerability is present in all releases prior to the 1.24.0 release, as documented by the vendor.
Risk and Exploitability
The CVSS score is 9.1, indicating a critical severity. The EPSS score is below 1 %, suggesting low exploitation likelihood, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authentication and access to the Git API endpoints, and the attack vector is via application‑level functionality rather than network‑level exploits.
OpenCVE Enrichment
Github GHSA