Zed, a code editor, has a symlink escape vulnerability in versions prior to 0.225.9 in Agent file tools (`read_file`, `edit_file`). It allows reading and writing files **outside the project directory** when a project contains symbolic links pointing to external paths. This bypasses the intended workspace boundary and privacy protections (`file_scan_exclusions`, `private_files`), potentially leaking sensitive user data to the LLM. Version 0.225.9 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/zed-industries/zed/security/advisories/GHSA-786m-x2vc-5235 | Vendor Advisory Exploit Mitigation |
Configurations
History
05 Mar 2026, 16:10
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/zed-industries/zed/security/advisories/GHSA-786m-x2vc-5235 - Vendor Advisory, Exploit, Mitigation | |
| First Time |
Zed zed
Zed |
|
| CPE | cpe:2.3:a:zed:zed:*:*:*:*:*:*:*:* | |
| Summary |
|
26 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 00:16
Updated : 2026-03-05 16:10
NVD link : CVE-2026-27967
Mitre link : CVE-2026-27967
CVE.ORG link : CVE-2026-27967
JSON object : View
Products Affected
zed
- zed
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
