Impact
Claude HUD constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without sanitizing control characters or encoding embedded data. This allows an attacker to inject arbitrary ANSI escape codes, such as color changes, forged prompts, or OSC 52 clipboard writes, by embedding ESC+backslash sequences in the directory path or branch URL. The injected codes can manipulate the terminal session, exfiltrate clipboard data, or trigger outbound HTTP requests when the hyperlink is activated.
Affected Systems
The vulnerability is present in all releases of jarrodwatts:claude‑hud up to and including version 0.0.12. A patch is included in commit 234d9aa, and versions built after this commit are unaffected.
Risk and Exploitability
The CVSS score of 2.4 indicates a low severity vulnerability with limited impact. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. Because the issue depends on injecting raw values into terminal escape sequences, it is most likely exploitable in a local or privileged context where an attacker can provide a crafted cwd or branch URL. While the exploit can read clipboard contents and send arbitrary HTTP requests, it does not provide remote code execution or system compromise beyond the terminal session. Nonetheless, applying the patch remains the recommended mitigation.
OpenCVE Enrichment