Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.7

Cloud CLI: Malicious Input Can Execute System Commands

GHSA-gv8f-wpm2-m5wr CVE-2026-31975
Summary

Cloud CLI's previous versions allowed hackers to use the program to execute arbitrary system commands. If you're using a version of Cloud CLI prior to 1.25.0, update to the latest version as soon as possible to fix the issue. This is a serious security risk, so don't delay.

What to do
  • Update siteboon claude-code-ui to version 1.25.0.
Affected software
VendorProductAffected versionsFix available
siteboon claude-code-ui <= 1.24.0 1.25.0
Original title
Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.25.0, OS Command Injection via WebSocket Shell. Both projectPath and initial...
Original description
Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.25.0, OS Command Injection via WebSocket Shell. Both projectPath and initialCommand in server/index.js are taken directly from the WebSocket message payload and interpolated into a bash command string without any sanitization, enabling arbitrary OS command execution. A secondary injection vector exists via unsanitized sessionId. This vulnerability is fixed in 1.25.0.
ghsa CVSS3.1 9.8
Vulnerability type
CWE-78 OS Command Injection
CWE-287 Improper Authentication
CWE-1188
Published: 11 Mar 2026 · Updated: 14 Mar 2026 · First seen: 11 Mar 2026