CVE-2026-47090
Claude HUD Terminal Hyperlink Injection via ANSI Escape Sequences
Publication date: 2026-05-18
Last updated on: 2026-05-18
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| claude_hud | claude_hud | From 0.0.12 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-150 | The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Claude HUD versions up to 0.0.12, where the software constructs OSC 8 terminal hyperlink escape sequences using raw current working directory (cwd) and branchUrl values without properly stripping control characters or encoding embedded values.
Because of this, attackers can inject arbitrary ANSI codes into terminal sessions by embedding ESC+backslash sequences in the cwd or branch URL.
These malicious ANSI codes can cause effects such as changing text colors, forging prompts, writing to the clipboard via OSC 52 sequences, or triggering outbound HTTP requests to attacker-controlled servers when hyperlinks are clicked.
How can this vulnerability impact me? :
This vulnerability can impact users by allowing attackers to execute arbitrary ANSI escape sequences within terminal sessions.
- Visual deception through forged prompts or altered text colors, potentially misleading users.
- Unauthorized clipboard writes via OSC 52 sequences, which could lead to data leakage or injection.
- Triggering outbound HTTP requests to attacker-controlled servers when terminal hyperlinks are clicked, potentially exposing user activity or enabling further attacks.