Impact
Claude HUD versions up to 0.0.12 contain a path traversal flaw. By supplying an unvalidated transcript_path value through stdin in a JSON payload, an attacker can read any file that the running process can access. The vulnerability also writes file metadata to a global cache file with insufficient permissions, leaving a forensic trail of accessed paths after the process terminates.
Affected Systems
The affected product is Claude HUD from jarrodwatts, specifically releases up to and including 0.0.12. The patch is applied in commit 234d9aa, so any version that has not incorporated this commit remains vulnerable.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate risk. No EPSS data is publicly available, and it is not listed in the CISA KEV catalog. The vulnerability can be exploited locally via the process’s stdin interface; if the application is exposed to network inputs, remote exploitation could be possible. Attackers with file read permissions on the system can harvest arbitrary files and leave a persistent record of the paths accessed.
OpenCVE Enrichment