Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gv8f-wpm2-m5wr | @siteboon/claude-code-ui Vulnerable to Unauthenticated RCE via WebSocket Shell Injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siteboon
Siteboon claudecodeui |
|
| Vendors & Products |
Siteboon
Siteboon claudecodeui |
Wed, 11 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.25.0, OS Command Injection via WebSocket Shell. Both projectPath and initialCommand in server/index.js are taken directly from the WebSocket message payload and interpolated into a bash command string without any sanitization, enabling arbitrary OS command execution. A secondary injection vector exists via unsanitized sessionId. This vulnerability is fixed in 1.25.0. | |
| Title | Cloud CLI WebSocket shell injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T14:05:01.389Z
Reserved: 2026-03-10T15:40:10.487Z
Link: CVE-2026-31975
Updated: 2026-03-12T14:04:49.696Z
Status : Awaiting Analysis
Published: 2026-03-11T18:16:27.177
Modified: 2026-03-12T21:08:22.643
Link: CVE-2026-31975
No data.
OpenCVE Enrichment
Updated: 2026-03-12T09:57:37Z
Github GHSA