Claude HUD through 0.0.12, patched in commit 234d9aa, constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without stripping control characters or encoding embedded values, allowing attackers to inject arbitrary ANSI codes into terminal sessions. Attackers can embed ESC+backslash sequences in the current working directory or branch URL to execute malicious ANSI codes including text color changes, forged prompts, and OSC 52 clipboard writes, or trigger outbound HTTP requests to attacker-controlled remotes when hyperlinks are clicked.
History

Tue, 19 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Jarrodwatts
Jarrodwatts claude-hud
Vendors & Products Jarrodwatts
Jarrodwatts claude-hud

Mon, 18 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Claude HUD through 0.0.12, patched in commit 234d9aa, constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without stripping control characters or encoding embedded values, allowing attackers to inject arbitrary ANSI codes into terminal sessions. Attackers can embed ESC+backslash sequences in the current working directory or branch URL to execute malicious ANSI codes including text color changes, forged prompts, and OSC 52 clipboard writes, or trigger outbound HTTP requests to attacker-controlled remotes when hyperlinks are clicked.
Title Claude HUD 0.0.12 Terminal Injection via OSC 8 Hyperlinks
Weaknesses CWE-150
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 2.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-05-18T19:31:33.193Z

Updated: 2026-05-19T12:48:39.819Z

Reserved: 2026-05-18T19:22:26.747Z

Link: CVE-2026-47090

cve-icon Vulnrichment

Updated: 2026-05-19T12:48:36.606Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-18T20:16:39.673

Modified: 2026-05-18T20:19:31.307

Link: CVE-2026-47090

cve-icon Redhat

No data.