{"data":{"id":"9c71f074-3891-40db-a0bc-b367cee92ee9","title":"CVE-2025-55012: Zed is a multiplayer code editor. Prior to version 0.197.3, in the Zed Agent Panel allowed for an AI agent to achieve Re","summary":"Zed, a multiplayer code editor, had a vulnerability before version 0.197.3 where an AI agent could bypass permission checks and achieve RCE (remote code execution, where an attacker can run commands on a system they don't own) by creating or modifying configuration files without user approval. This allowed the AI agent to execute arbitrary commands on a victim's machine.","solution":"This vulnerability has been patched in version 0.197.3. As a workaround, users can either avoid sending prompts to the Agent Panel or limit the AI Agent's file system access.","labels":["security"],"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2025-55012","publishedAt":"2025-08-11T22:15:27.843Z","cveId":"CVE-2025-55012","cweIds":["CWE-284","CWE-288"],"cvssScore":null,"cvssSeverity":null,"severity":"high","attackType":["prompt_injection"],"issueType":"vulnerability","affectedPackages":null,"affectedVendors":[],"affectedVendorsRaw":["Zed"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":"unknown","epssScore":0.00024,"patchAvailable":null,"disclosureDate":null,"capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["integrity","availability"],"aiComponentTargeted":"agent","llmSpecific":false,"classifierConfidence":0.85,"researchCategory":null,"atlasIds":null}}