Codex CLI is a coding agent from OpenAI that runs locally. In versions 0.2.0 to 0.38.0, due to a bug in the sandbox configuration logic, Codex CLI could treat a model-generated cwd as the sandbox’s writable root, including paths outside of the folder where the user started their session. This logic bypassed the intended workspace boundary and enables arbitrary file writes and command execution where the Codex process has permissions - this did not impact the network-disabled sandbox restriction. This issue has been patched in Codex CLI 0.39.0 that canonicalizes and validates that the boundary used for sandbox policy is based on where the user started the session, and not the one generated by the model. Users running 0.38.0 or earlier should update immediately via their package manager or by reinstalling the latest Codex CLI to ensure sandbox boundaries are enforced. If using the Codex IDE extension, users should immediately update to 0.4.12 for a fix of the sandbox issue.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 23 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Openai Openai codex | |
| Vendors & Products | Openai Openai codex | 
Mon, 22 Sep 2025 20:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Codex CLI is a coding agent from OpenAI that runs locally. In versions 0.2.0 to 0.38.0, due to a bug in the sandbox configuration logic, Codex CLI could treat a model-generated cwd as the sandbox’s writable root, including paths outside of the folder where the user started their session. This logic bypassed the intended workspace boundary and enables arbitrary file writes and command execution where the Codex process has permissions - this did not impact the network-disabled sandbox restriction. This issue has been patched in Codex CLI 0.39.0 that canonicalizes and validates that the boundary used for sandbox policy is based on where the user started the session, and not the one generated by the model. Users running 0.38.0 or earlier should update immediately via their package manager or by reinstalling the latest Codex CLI to ensure sandbox boundaries are enforced. If using the Codex IDE extension, users should immediately update to 0.4.12 for a fix of the sandbox issue. | |
| Title | Codex has sandbox bypass due to bug in path configuration logic | |
| Weaknesses | CWE-20 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-22T20:26:42.712Z
Updated: 2025-09-23T20:19:23.374Z
Reserved: 2025-09-17T17:04:20.373Z
Link: CVE-2025-59532
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-09-23T20:19:17.444Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-09-22T21:16:00.130
Modified: 2025-09-22T21:22:16.313
Link: CVE-2025-59532
 Redhat
                        Redhat
                    No data.