CVE-2026-47091
Claude HUD 0.0.12 Path Traversal via transcript_path
CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th
Claude HUD through 0.0.12, patched in commit 234d9aa, contains a path traversal vulnerability that allows attackers to read arbitrary files by supplying an unvalidated transcript_path value via stdin JSON. Attackers can access any file readable by the process and the file metadata is written to a persistent cache file with insufficient permissions, creating a forensic record of accessed paths that survives process exit.
| CWE | CWE-22 |
| Vendor | jarrodwatts |
| Product | claude-hud |
| Published | May 18, 2026 |
| Last Updated | May 19, 2026 |
Stay Ahead of the Next One
Get instant alerts for jarrodwatts claude-hud
Be the first to know when new low vulnerabilities affecting jarrodwatts claude-hud are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Affected Versions
jarrodwatts / claude-hud
0 โค 0.0.12
References
github.com: https://github.com/jarrodwatts/claude-hud/issues/485 github.com: https://github.com/jarrodwatts/claude-hud/pull/487 github.com: https://github.com/jarrodwatts/claude-hud/commit/234d9aad919b51326a43bcf90b45ae35c23afc30 vulncheck.com: https://www.vulncheck.com/advisories/claude-hud-path-traversal-via-transcript-path
Credits
Katriel Moses