CVE-2026-47091
Description
Claude HUD through 0.0.12, patched in commit 234d9aa, contains a path traversal vulnerability that allows attackers to read arbitrary files by supplying an unvalidated transcript_path value via stdin JSON. Attackers can access any file readable by the process and the file metadata is written to a persistent cache file with insufficient permissions, creating a forensic record of accessed paths that survives process exit.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Claude HUD ≤0.0.12 has a path traversal vulnerability via unvalidated transcript_path, allowing arbitrary file read and metadata logging.
Vulnerability
Details
Claude HUD up to version 0.0.12 contains a path traversal vulnerability in its handling of the transcript_path parameter received via stdin JSON. The application fails to validate or sanitize the provided path, allowing an attacker to supply arbitrary file paths (e.g., using ../ sequences) [4]. The root cause is the lack of a allowlist or boundary check on the file path before file system operations.
Exploitation
An attacker can exploit this by sending a crafted JSON input containing a transcript_path that points to any file readable by the process. No authentication is required beyond the ability to provide stdin input to the Claude HUD process [3]. For example, supplying /etc/passwd as the path would allow reading that system file.
Impact
Successful exploitation allows an attacker to read arbitrary files on the system. Additionally, the file metadata (path, size, modification time) is written to a persistent cache file with insufficient permissions, creating a forensic record of accessed paths that survives process exit [4]. This could expose sensitive information and leave traces of the attack.
Mitigation
The vulnerability is patched in commit 234d9aa, which adds input validation and path resolution checks to ensure only files within the expected directory are accessible [2]. Users should update to a version containing this fix. No workarounds are available for unpatched versions [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.