Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch, message, commit), allowing authenticated attackers to execute arbitrary OS commands. This vulnerability is fixed in 1.24.0.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-f2fc-vc88-6w7q @siteboon/claude-code-ui is Vulnerable to Command Injection via Multiple Parameters
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 11 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch, message, commit), allowing authenticated attackers to execute arbitrary OS commands. This vulnerability is fixed in 1.24.0.
Title Cloud CLI has Command Injection via Multiple Parameters
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T17:17:47.941Z

Reserved: 2026-03-09T19:02:25.013Z

Link: CVE-2026-31862

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-11T18:16:25.073

Modified: 2026-03-11T18:16:25.073

Link: CVE-2026-31862

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses