In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
https://zsh.sourceforge.io/releases.html
https://vuln.ryotak.me/advisories/63
https://www.debian.org/security/2022/dsa-5078
https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
http://seclists.org/fulldisclosure/2022/May/33
Source: MITRE
Published: 2022-02-14
Updated: 2022-09-30
Type: NVD-CWE-noinfo
Base Score: 5.1
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 4.9
Severity: MEDIUM
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH