Zed < 0.225.9 Symlink Escape (CVE-2026-27967)

high Nessus Plugin ID 300255

Synopsis

A code editor installed on the remote host is affected by a symlink escape vulnerability.

Description

The version of Zed installed on the remote host is prior to 0.225.9. It is, therefore, affected by a symlink escape vulnerability:

- A symlink escape vulnerability exists in the Zed Agent file tools (read_file, edit_file) that allows reading and writing files outside the project directory when a project contains symbolic links pointing to external paths. This bypasses the intended workspace boundary and privacy protections, potentially leaking sensitive user data to the LLM. (CVE-2026-27967)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Zed version 0.225.9 or later.

See Also

http://www.nessus.org/u?25ad9145

Plugin Details

Severity: High

ID: 300255

File Name: zed_0_225_9.nasl

Version: 1.1

Type: local

Agent: windows, macosx, unix

Published: 3/2/2026

Updated: 3/2/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v3

Risk Factor: High

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/a:zed:zed

Required KB Items: installed_sw/Zed

Patch Publication Date: 2/25/2026

Vulnerability Publication Date: 2/25/2026

Reference Information

CVE: CVE-2026-27967