Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, The /api/user/git-config endpoint constructs shell commands by interpolating user-supplied gitName and gitEmail values into command strings passed to child_process.exec(). The input is placed within double quotes and only " is escaped, but backticks (`), $() command substitution, and \ sequences are all interpreted within double-quoted strings in bash. This allows authenticated attackers to execute arbitrary OS commands via the git configuration endpoint. This vulnerability is fixed in 1.24.0.
References
| Link | Resource |
|---|---|
| https://github.com/siteboon/claudecodeui/commit/86c33c1c0cb34176725a38f46960213714fc3e04 | Patch |
| https://github.com/siteboon/claudecodeui/releases/tag/v1.24.0 | Release Notes |
| https://github.com/siteboon/claudecodeui/security/advisories/GHSA-7fv4-fmmc-86g2 | Exploit Vendor Advisory |
| https://github.com/siteboon/claudecodeui/security/advisories/GHSA-7fv4-fmmc-86g2 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-11 18:16
Updated : 2026-03-17 19:06
NVD link : CVE-2026-31861
Mitre link : CVE-2026-31861
CVE.ORG link : CVE-2026-31861
JSON object : View
Products Affected
cloudcli
- cloud_cli
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
