{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T23:33:04.129","vulnerabilities":[{"cve":{"id":"CVE-2026-25805","sourceIdentifier":"security-advisories@github.com","published":"2026-02-10T18:16:38.200","lastModified":"2026-02-19T15:08:32.990","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Zed is a multiplayer code editor. Prior to 0.219.4, Zed does not show with which parameters a tool is being invoked, when asking for allowance. Further it does not show after the tool was being invoked, which parameters were used. Thus, maybe unwanted or even malicious values could be used without the user having a chance to notice it. Patched in Zed Editor 0.219.4 which includes expandable tool call details."},{"lang":"es","value":"Zed es un editor de código multijugador. Antes de la 0.219.4, Zed no muestra con qué parámetros se invoca una herramienta al solicitar permiso. Además, no muestra qué parámetros se utilizaron después de invocar la herramienta. Por lo tanto, valores posiblemente no deseados o incluso maliciosos podrían usarse sin que el usuario tenga la oportunidad de notarlo. Corregido en Zed Editor 0.219.4, que incluye detalles de llamada de herramienta expandibles."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.5,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-356"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zed:zed:*:*:*:*:*:*:*:*","versionEndExcluding":"0.219.4","matchCriteriaId":"097AC575-E913-4FE5-A82A-BC46101AA936"}]}]}],"references":[{"url":"https://github.com/zed-industries/zed/security/advisories/GHSA-f2g4-87h6-4pxq","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}