{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T20:19:50.549","vulnerabilities":[{"cve":{"id":"CVE-2026-31862","sourceIdentifier":"security-advisories@github.com","published":"2026-03-11T18:16:25.073","lastModified":"2026-03-17T19:04:29.000","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch, message, commit), allowing authenticated attackers to execute arbitrary OS commands. This vulnerability is fixed in 1.24.0."},{"lang":"es","value":"Cloud CLI (también conocida como Claude Code UI) es una interfaz de usuario (UI) de escritorio y móvil para Claude Code, Cursor CLI, Codex y Gemini-CLI. Antes de la versión 1.24.0, múltiples puntos finales de API relacionados con Git utilizan execAsync() con interpolación de cadenas de parámetros controlados por el usuario (file, branch, message, commit), lo que permite a atacantes autenticados ejecutar comandos arbitrarios del sistema operativo. Esta vulnerabilidad está corregida en la versión 1.24.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cloudcli:cloud_cli:*:*:*:*:*:*:*:*","versionEndExcluding":"1.24.0","matchCriteriaId":"7D084438-4C97-467F-8517-14FE6949B298"}]}]}],"references":[{"url":"https://github.com/siteboon/claudecodeui/releases/tag/v1.24.0","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/siteboon/claudecodeui/security/advisories/GHSA-f2fc-vc88-6w7q","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}