๐Ÿ” CVE Alert

CVE-2026-47091

LOW 3.3

Claude HUD 0.0.12 Path Traversal via transcript_path

CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th

Claude HUD through 0.0.12, patched in commit 234d9aa, contains a path traversal vulnerability that allows attackers to read arbitrary files by supplying an unvalidated transcript_path value via stdin JSON. Attackers can access any file readable by the process and the file metadata is written to a persistent cache file with insufficient permissions, creating a forensic record of accessed paths that survives process exit.

CWE CWE-22
Vendor jarrodwatts
Product claude-hud
Published May 18, 2026
Last Updated May 19, 2026
Stay Ahead of the Next One

Get instant alerts for jarrodwatts claude-hud

Be the first to know when new low vulnerabilities affecting jarrodwatts claude-hud are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

jarrodwatts / claude-hud
0 โ‰ค 0.0.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jarrodwatts/claude-hud/issues/485 github.com: https://github.com/jarrodwatts/claude-hud/pull/487 github.com: https://github.com/jarrodwatts/claude-hud/commit/234d9aad919b51326a43bcf90b45ae35c23afc30 vulncheck.com: https://www.vulncheck.com/advisories/claude-hud-path-traversal-via-transcript-path

Credits

Katriel Moses