CVE-2026-27967

7.1 HIGH

📋 TL;DR

Zed code editor versions before 0.225.9 have a symlink escape vulnerability that allows reading and writing files outside the project directory when symbolic links point to external paths. This bypasses workspace boundaries and privacy protections, potentially exposing sensitive user data to the LLM. All users running affected versions are vulnerable.

💻 Affected Systems

Products:
  • Zed
Versions: All versions prior to 0.225.9
Operating Systems: All platforms where Zed runs
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires a project containing symbolic links pointing to external paths to be exploited.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files (passwords, SSH keys, configuration files) or write malicious files to critical system locations, leading to complete system compromise.

🟠

Likely Case

Unauthorized access to user files outside the project directory, potentially exposing personal documents, configuration files, or other sensitive data stored on the system.

🟢

If Mitigated

Limited to accessing only files within the project directory as intended, with privacy protections functioning correctly.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction with a malicious project containing symlinks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.225.9

Vendor Advisory: https://github.com/zed-industries/zed/security/advisories/GHSA-786m-x2vc-5235

Restart Required: Yes

Instructions:

1. Open Zed. 2. Go to Settings/Preferences. 3. Check for updates. 4. Install version 0.225.9 or later. 5. Restart Zed.

🔧 Temporary Workarounds

Avoid untrusted projects with symlinks

all

Do not open projects containing symbolic links from untrusted sources.

Disable Agent file tools

all

Temporarily disable the vulnerable Agent file tools if available in settings.

🧯 If You Can't Patch

  • Avoid opening projects with symbolic links from untrusted sources.
  • Use Zed in isolated environments or sandboxes when working with untrusted projects.

🔍 How to Verify

Check if Vulnerable:

Check Zed version in Settings/Preferences → About. If version is below 0.225.9, you are vulnerable.

Check Version:

zed --version

Verify Fix Applied:

Confirm version is 0.225.9 or higher in Settings/Preferences → About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns outside project directories
  • Errors related to symlink resolution in Agent tools

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Not applicable for local file access vulnerability

🔗 References

📤 Share & Export