{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T02:30:31.492","vulnerabilities":[{"cve":{"id":"CVE-2026-27967","sourceIdentifier":"security-advisories@github.com","published":"2026-02-26T00:16:27.137","lastModified":"2026-03-05T16:10:10.473","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Zed, a code editor, has a symlink escape vulnerability in versions prior to 0.225.9 in Agent file tools (`read_file`, `edit_file`). It allows reading and writing files **outside the project directory** when a project contains symbolic links pointing to external paths. This bypasses the intended workspace boundary and privacy protections (`file_scan_exclusions`, `private_files`), potentially leaking sensitive user data to the LLM. Version 0.225.9 fixes the issue."},{"lang":"es","value":"Zed, un editor de código, tiene una vulnerabilidad de escape de symlink en versiones anteriores a la 0.225.9 en las herramientas de archivo del Agente ('read_file', 'edit_file'). Permite leer y escribir archivos fuera del directorio del proyecto cuando un proyecto contiene enlaces simbólicos que apuntan a rutas externas. Esto elude el límite de espacio de trabajo previsto y las protecciones de privacidad ('file_scan_exclusions', 'private_files'), lo que podría filtrar datos sensibles del usuario al LLM. La versión 0.225.9 soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zed:zed:*:*:*:*:*:*:*:*","versionEndExcluding":"0.225.9","matchCriteriaId":"F2B65125-64EB-4054-BE09-6EFDEE894188"}]}]}],"references":[{"url":"https://github.com/zed-industries/zed/security/advisories/GHSA-786m-x2vc-5235","source":"security-advisories@github.com","tags":["Vendor Advisory","Exploit","Mitigation"]}]}}]}