CVE-2026-27967
📋 TL;DR
Zed code editor versions before 0.225.9 have a symlink escape vulnerability that allows reading and writing files outside the project directory when symbolic links point to external paths. This bypasses workspace boundaries and privacy protections, potentially exposing sensitive user data to the LLM. All users running affected versions are vulnerable.
💻 Affected Systems
- Zed
📦 What is this software?
Zed by Zed
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files (passwords, SSH keys, configuration files) or write malicious files to critical system locations, leading to complete system compromise.
Likely Case
Unauthorized access to user files outside the project directory, potentially exposing personal documents, configuration files, or other sensitive data stored on the system.
If Mitigated
Limited to accessing only files within the project directory as intended, with privacy protections functioning correctly.
🎯 Exploit Status
Exploitation requires user interaction with a malicious project containing symlinks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.225.9
Vendor Advisory: https://github.com/zed-industries/zed/security/advisories/GHSA-786m-x2vc-5235
Restart Required: Yes
Instructions:
1. Open Zed. 2. Go to Settings/Preferences. 3. Check for updates. 4. Install version 0.225.9 or later. 5. Restart Zed.
🔧 Temporary Workarounds
Avoid untrusted projects with symlinks
allDo not open projects containing symbolic links from untrusted sources.
Disable Agent file tools
allTemporarily disable the vulnerable Agent file tools if available in settings.
🧯 If You Can't Patch
- Avoid opening projects with symbolic links from untrusted sources.
- Use Zed in isolated environments or sandboxes when working with untrusted projects.
🔍 How to Verify
Check if Vulnerable:
Check Zed version in Settings/Preferences → About. If version is below 0.225.9, you are vulnerable.
Check Version:
zed --version
Verify Fix Applied:
Confirm version is 0.225.9 or higher in Settings/Preferences → About.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns outside project directories
- Errors related to symlink resolution in Agent tools
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
Not applicable for local file access vulnerability