Description
Claude HUD through 0.0.12, patched in commit 234d9aa, constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without stripping control characters or encoding embedded values, allowing attackers to inject arbitrary ANSI codes into terminal sessions. Attackers can embed ESC+backslash sequences in the current working directory or branch URL to execute malicious ANSI codes including text color changes, forged prompts, and OSC 52 clipboard writes, or trigger outbound HTTP requests to attacker-controlled remotes when hyperlinks are clicked.
Published: 2026-05-18
Score: 2.4 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Claude HUD constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without sanitizing control characters or encoding embedded data. This allows an attacker to inject arbitrary ANSI escape codes, such as color changes, forged prompts, or OSC 52 clipboard writes, by embedding ESC+backslash sequences in the directory path or branch URL. The injected codes can manipulate the terminal session, exfiltrate clipboard data, or trigger outbound HTTP requests when the hyperlink is activated.

Affected Systems

The vulnerability is present in all releases of jarrodwatts:claude‑hud up to and including version 0.0.12. A patch is included in commit 234d9aa, and versions built after this commit are unaffected.

Risk and Exploitability

The CVSS score of 2.4 indicates a low severity vulnerability with limited impact. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. Because the issue depends on injecting raw values into terminal escape sequences, it is most likely exploitable in a local or privileged context where an attacker can provide a crafted cwd or branch URL. While the exploit can read clipboard contents and send arbitrary HTTP requests, it does not provide remote code execution or system compromise beyond the terminal session. Nonetheless, applying the patch remains the recommended mitigation.

Generated by OpenCVE AI on May 18, 2026 at 21:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch from commit 234d9aa by upgrading to a version newer than 0.0.12
  • Modify the source or configuration to escape or strip control characters from cwd and branchUrl before constructing OSC 8 hyperlinks
  • Configure the terminal emulator to disallow OSC 52 clipboard writes or disable hyperlink handling for OSC 8 sequences as a temporary workaround

Generated by OpenCVE AI on May 18, 2026 at 21:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Claude HUD through 0.0.12, patched in commit 234d9aa, constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without stripping control characters or encoding embedded values, allowing attackers to inject arbitrary ANSI codes into terminal sessions. Attackers can embed ESC+backslash sequences in the current working directory or branch URL to execute malicious ANSI codes including text color changes, forged prompts, and OSC 52 clipboard writes, or trigger outbound HTTP requests to attacker-controlled remotes when hyperlinks are clicked.
Title Claude HUD 0.0.12 Terminal Injection via OSC 8 Hyperlinks
Weaknesses CWE-150
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 2.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-18T19:44:17.786Z

Reserved: 2026-05-18T19:22:26.747Z

Link: CVE-2026-47090

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-18T20:16:39.673

Modified: 2026-05-18T20:19:31.307

Link: CVE-2026-47090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T21:30:15Z

Weaknesses