๐Ÿ” CVE Alert

CVE-2026-47092

HIGH 7.8

Claude HUD 0.0.12 Arbitrary Command Execution via COMSPEC Environment Variable

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
12th

Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability that allows local attackers to execute arbitrary commands by manipulating the COMSPEC environment variable. Attackers can set COMSPEC to an arbitrary binary path before claude-hud performs its version check, causing execFile() to execute the attacker-supplied executable with cmd.exe arguments, resulting in arbitrary code execution on Windows systems.

CWE CWE-427
Vendor jarrodwatts
Product claude-hud
Published May 18, 2026
Last Updated May 19, 2026
Stay Ahead of the Next One

Get instant alerts for jarrodwatts claude-hud

Be the first to know when new high vulnerabilities affecting jarrodwatts claude-hud are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

jarrodwatts / claude-hud
0 โ‰ค 0.0.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jarrodwatts/claude-hud/issues/485 github.com: https://github.com/jarrodwatts/claude-hud/pull/487 github.com: https://github.com/jarrodwatts/claude-hud/commit/234d9aad919b51326a43bcf90b45ae35c23afc30 vulncheck.com: https://www.vulncheck.com/advisories/claude-hud-arbitrary-command-execution-via-comspec-environment-variable

Credits

Katriel Moses