Vulnerability DatabaseGHSA-w5fx-fh39-j5rw

GHSA-w5fx-fh39-j5rw
JavaScript vulnerability analysis and mitigation

Overview

A high-severity vulnerability (GHSA-w5fx-fh39-j5rw) was discovered in OpenAI's Codex CLI and IDE Extension, affecting versions 0.2.0 through 0.38.0 of the npm package @openai/codex and versions up to 0.4.11 of the Codex IDE Extension. The vulnerability was disclosed on September 19, 2025, and involves a sandbox bypass due to a bug in the path configuration logic (GitHub Advisory).

Technical details

The vulnerability stems from a bug in the sandbox configuration logic where Codex CLI could incorrectly treat a model-generated current working directory (cwd) as the sandbox's writable root. This includes paths outside of the folder where the user started their session, effectively bypassing the intended workspace boundary. The vulnerability has been assigned a CVSS score of 8.6 (High), with attack vector being Network, attack complexity Low, and requiring Low privileges with Passive user interaction. The vulnerability impacts system confidentiality, integrity, and availability at High levels (GitHub Advisory).

Impact

The vulnerability enables arbitrary file writes and command execution wherever the Codex process has permissions, though it's important to note that the network-disabled sandbox restriction remained unaffected. This could potentially allow attackers to access and modify files outside the intended workspace boundaries (GitHub Advisory).

Mitigation and workarounds

A patch has been released in Codex CLI version 0.39.0 that canonicalizes and validates that the boundary used for sandbox policy is based on where the user started the session, rather than the model-generated one. Users running version 0.38.0 or earlier should immediately update via their package manager or reinstall the latest Codex CLI. For Codex IDE extension users, an update to version 0.4.12 is available and should be installed immediately (GitHub Advisory, GitHub Release).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-w5fx-fh39-j5rwHIGH8.6
  • JavaScriptJavaScript
  • @openai/codex
NoYesSep 19, 2025
CVE-2025-59417MEDIUM6.8
  • JavaScriptJavaScript
  • @lobehub/chat
NoYesSep 18, 2025
CVE-2025-59717MEDIUM5.4
  • JavaScriptJavaScript
  • @digitalocean/do-markdownit
NoNoSep 19, 2025
CVE-2025-10619MEDIUM5.3
  • JavaScriptJavaScript
  • @sequa-ai/sequa-mcp
NoYesSep 17, 2025
CVE-2025-59427LOW2.9
  • JavaScriptJavaScript
  • @cloudflare/vite-plugin
NoYesSep 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management