Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory.
History

Thu, 14 Aug 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Openai
Openai codex
Vendors & Products Openai
Openai codex

Wed, 13 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 09:15:00 +0000

Type Values Removed Values Added
Description Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory.
Title Unsafe symlink following in restricted workspace-write sandbox leads to RCE
Weaknesses CWE-61
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published: 2025-08-13T08:55:14.016Z

Updated: 2025-08-13T19:58:27.552Z

Reserved: 2025-08-13T04:40:32.039Z

Link: CVE-2025-55345

cve-icon Vulnrichment

Updated: 2025-08-13T17:50:59.009Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T09:15:29.087

Modified: 2025-08-13T20:15:32.740

Link: CVE-2025-55345

cve-icon Redhat

No data.