Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.7
Cloud CLI: Malicious Input Can Execute System Commands
GHSA-gv8f-wpm2-m5wr
CVE-2026-31975
Summary
Cloud CLI's previous versions allowed hackers to use the program to execute arbitrary system commands. If you're using a version of Cloud CLI prior to 1.25.0, update to the latest version as soon as possible to fix the issue. This is a serious security risk, so don't delay.
What to do
- Update siteboon claude-code-ui to version 1.25.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| siteboon | claude-code-ui | <= 1.24.0 | 1.25.0 |
Original title
Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.25.0, OS Command Injection via WebSocket Shell. Both projectPath and initial...
Original description
Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.25.0, OS Command Injection via WebSocket Shell. Both projectPath and initialCommand in server/index.js are taken directly from the WebSocket message payload and interpolated into a bash command string without any sanitization, enabling arbitrary OS command execution. A secondary injection vector exists via unsanitized sessionId. This vulnerability is fixed in 1.25.0.
ghsa CVSS3.1
9.8
Vulnerability type
CWE-78
OS Command Injection
CWE-287
Improper Authentication
CWE-1188
- https://github.com/siteboon/claudecodeui/security/advisories/GHSA-gv8f-wpm2-m5wr
- https://github.com/siteboon/claudecodeui/commit/12e7f074d9563b3264caf9cec6e1b701...
- https://github.com/siteboon/claudecodeui/releases/tag/v1.25.0
- https://github.com/advisories/GHSA-gv8f-wpm2-m5wr
- https://nvd.nist.gov/vuln/detail/CVE-2026-31975
Published: 11 Mar 2026 · Updated: 14 Mar 2026 · First seen: 11 Mar 2026