Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7fv4-fmmc-86g2 | @siteboon/claude-code-ui is Vulnerable to Shell Command Injection in Git Routes |
Tue, 17 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloudcli
Cloudcli cloud Cli |
|
| CPEs | cpe:2.3:a:cloudcli:cloud_cli:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cloudcli
Cloudcli cloud Cli |
|
| Metrics |
cvssV3_1
|
Thu, 12 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siteboon
Siteboon claudecodeui |
|
| Vendors & Products |
Siteboon
Siteboon claudecodeui |
Wed, 11 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, The /api/user/git-config endpoint constructs shell commands by interpolating user-supplied gitName and gitEmail values into command strings passed to child_process.exec(). The input is placed within double quotes and only " is escaped, but backticks (`), $() command substitution, and \ sequences are all interpreted within double-quoted strings in bash. This allows authenticated attackers to execute arbitrary OS commands via the git configuration endpoint. This vulnerability is fixed in 1.24.0. | |
| Title | Shell Command Injection in Git Routes [CloudCLI UI] | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T14:07:17.766Z
Reserved: 2026-03-09T19:02:25.012Z
Link: CVE-2026-31861
Updated: 2026-03-12T14:07:04.043Z
Status : Analyzed
Published: 2026-03-11T18:16:24.887
Modified: 2026-03-17T19:06:41.493
Link: CVE-2026-31861
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:30:17Z
Github GHSA