Arbitrary Code Execution Vulnerability in Zed IDE by Zed Industries
CVE-2025-68433

7.8HIGH

Key Information:

Status
Vendor
CVE Published:
17 December 2025

What is CVE-2025-68433?

Zed IDE, a popular code editor, is susceptible to an arbitrary code execution flaw due to improper handling of Model Context Protocol (MCP) configurations. This vulnerability allows malicious MCP configurations to execute shell commands on the user's host system with the same privileges as the running IDE. The exploitation occurs automatically when a project containing a compromised settings.json file is opened, without any direct user interaction. Users are urged to upgrade to version 0.218.2-pre which mitigates the risk through a worktree trust mechanism. As a precautionary measure, reviewing ./zed/settings.json before opening new projects can help prevent potential attacks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

zed < 0.218.2-pre

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.