CVE-2026-47092
Claude HUD 0.0.12 Arbitrary Command Execution via COMSPEC Environment Variable
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
12th
Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability that allows local attackers to execute arbitrary commands by manipulating the COMSPEC environment variable. Attackers can set COMSPEC to an arbitrary binary path before claude-hud performs its version check, causing execFile() to execute the attacker-supplied executable with cmd.exe arguments, resulting in arbitrary code execution on Windows systems.
| CWE | CWE-427 |
| Vendor | jarrodwatts |
| Product | claude-hud |
| Published | May 18, 2026 |
| Last Updated | May 19, 2026 |
Stay Ahead of the Next One
Get instant alerts for jarrodwatts claude-hud
Be the first to know when new high vulnerabilities affecting jarrodwatts claude-hud are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
jarrodwatts / claude-hud
0 โค 0.0.12
References
github.com: https://github.com/jarrodwatts/claude-hud/issues/485 github.com: https://github.com/jarrodwatts/claude-hud/pull/487 github.com: https://github.com/jarrodwatts/claude-hud/commit/234d9aad919b51326a43bcf90b45ae35c23afc30 vulncheck.com: https://www.vulncheck.com/advisories/claude-hud-arbitrary-command-execution-via-comspec-environment-variable
Credits
Katriel Moses