Логотип exploitDog
bind:CVE-2025-55345
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-55345

Количество 2

Количество 2

nvd логотип

CVE-2025-55345

6 месяцев назад

Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-698g-97rr-xgjf

6 месяцев назад

Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-55345

Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory.

CVSS3: 8.8
0%
Низкий
6 месяцев назад
github логотип
GHSA-698g-97rr-xgjf

Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory.

CVSS3: 8.8
0%
Низкий
6 месяцев назад

Уязвимостей на страницу