Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24554 | Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory. |
Thu, 14 Aug 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openai
Openai codex |
|
| Vendors & Products |
Openai
Openai codex |
Wed, 13 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 Aug 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory. | |
| Title | Unsafe symlink following in restricted workspace-write sandbox leads to RCE | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-08-13T19:58:27.552Z
Reserved: 2025-08-13T04:40:32.039Z
Link: CVE-2025-55345
Updated: 2025-08-13T17:50:59.009Z
Status : Deferred
Published: 2025-08-13T09:15:29.087
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-55345
No data.
OpenCVE Enrichment
Updated: 2025-08-13T21:47:03Z
EUVD