Impact
The vulnerability arises from improper validation of bash commands in the Snowflake Cortex Code Command‑Line Interface, allowing subsequent commands to be executed outside the intended sandbox. This flaw, identified as CWE‑1286, enables an attacker to embed specially crafted commands in untrusted content such as a malicious repository, leading to arbitrary code execution on the local device without user consent. The impact is a compromise of confidentiality, integrity, and availability of the affected system.
Affected Systems
Snowflake Cortex Code CLI versions prior to 1.0.25 are affected; any installation that processes untrusted repositories or content can be impacted. No specific operating system is singled out, so all platforms supported by the CLI are potentially vulnerable.
Risk and Exploitability
The CVSS score of 8.3 signals high severity. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed active exploitation. The likely attack vector, inferred from the description, involves submitting malicious content through a repository that the CLI consumes; the exploitation is non‑deterministic and model‑dependent. While the risk window may be limited, the potential damage remains significant and requires prompt remediation.
OpenCVE Enrichment