CVE-2026-47090
Awaiting Analysis Awaiting Analysis - Queue
Claude HUD Terminal Hyperlink Injection via ANSI Escape Sequences

Publication date: 2026-05-18

Last updated on: 2026-05-18

Assigner: VulnCheck

Description
Claude HUD through 0.0.12, patched in commit 234d9aa, constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without stripping control characters or encoding embedded values, allowing attackers to inject arbitrary ANSI codes into terminal sessions. Attackers can embed ESC+backslash sequences in the current working directory or branch URL to execute malicious ANSI codes including text color changes, forged prompts, and OSC 52 clipboard writes, or trigger outbound HTTP requests to attacker-controlled remotes when hyperlinks are clicked.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-18
Last Modified
2026-05-18
Generated
2026-05-20
AI Q&A
2026-05-19
EPSS Evaluated
2026-05-19
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
claude_hud claude_hud From 0.0.12 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-150 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Claude HUD versions up to 0.0.12, where the software constructs OSC 8 terminal hyperlink escape sequences using raw current working directory (cwd) and branchUrl values without properly stripping control characters or encoding embedded values.

Because of this, attackers can inject arbitrary ANSI codes into terminal sessions by embedding ESC+backslash sequences in the cwd or branch URL.

These malicious ANSI codes can cause effects such as changing text colors, forging prompts, writing to the clipboard via OSC 52 sequences, or triggering outbound HTTP requests to attacker-controlled servers when hyperlinks are clicked.


How can this vulnerability impact me? :

This vulnerability can impact users by allowing attackers to execute arbitrary ANSI escape sequences within terminal sessions.

  • Visual deception through forged prompts or altered text colors, potentially misleading users.
  • Unauthorized clipboard writes via OSC 52 sequences, which could lead to data leakage or injection.
  • Triggering outbound HTTP requests to attacker-controlled servers when terminal hyperlinks are clicked, potentially exposing user activity or enabling further attacks.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart