Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Data Breach

Codex Bug Let Repo Files Execute Hidden Commands

Cyberinchief by Cyberinchief
December 3, 2025
Reading Time: 4 mins read
0
Codex Bug Let Repo Files Execute Hidden Commands


Agentic AI
,
Artificial Intelligence & Machine Learning
,
Next-Generation Technologies & Secure Development

RELATED POSTS

UK Hospital Asks Court to Stymie Ransomware Data Leak

These five countries recorded the most third-party data breaches last year

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

Attackers Could Hijack Developer Machines via Tampered Config Files

Rashmi Ramesh (rashmiramesh_) •
December 3, 2025    

Codex Bug Let Repo Files Execute Hidden Commands
Image: Shutterstock

OpenAI patched a command-injection flaw in its Codex CLI tool that let attackers run arbitrary commands on developer machines by hiding malicious configuration files inside code repositories.

See Also: Proof of Concept: Rethinking Identity for the Age of AI Agents

Cybersecurity firm Check Point said Monday that it disclosed the flaw to OpenAI on Aug. 7, and that the company released a fix on Aug. 20 in Codex CLI version 0.23.0. The vulnerability exploited how the terminal-based coding assistant handled project configurations, turning routine developer workflows into potential attack vectors.

Codex CLI is OpenAI’s command-line tool that brings artificial intelligence reasoning into software development. Developers use it to read, edit and execute code directly from the terminal using natural language commands. The tool extends its capabilities through the model context protocol, a standard that allows integration of external services and custom workflows.

The vulnerability centered on how Codex CLI automatically loaded and executed MCP server entries from project-local configuration files whenever developers ran the Codex command inside a repository. If a repository contained a file that redirected the tool’s configuration directory to a local folder, along with a configuration file listing MCP server commands, Codex would immediately invoke those commands at startup without user approval or validation.

Buy JNews
ADVERTISEMENT

Diana Kelley, CISO at AI security and governance company Noma Security, said Check Point’s research on the vulnerability, tracked as CVE-2025-61260, reflects a broader trend in AI-assisted development environments, where tools behave more like autonomous agents than like passive helpers.

“The issue stems from Codex placing automatic trust in project-level configuration,” she told Information Security Media Group. “If those files are tampered with, any developer who downloads the project and uses Codex will unknowingly trigger attacker-defined commands embedded in that configuration.”

The tool treated project-local MCP configuration as trusted execution material, with no interactive approval, secondary validation of commands or arguments, or recheck when values changed. This design turned ordinary repository files into execution vectors. An attacker who could commit or merge specific configuration files would trigger arbitrary commands on any developer who cloned the repository and ran Codex.

With no prompt, no approval step and no mechanism to recheck whether those actions have changed, “a routine developer action can silently execute attacker-controlled commands on a corporate workstation,” she said.

Kelley said that the implications extend beyond a single flaw. “We now live in a reality where configuration files can become execution vectors and AI-driven developer tooling behaves like an implicit extension of the operating system,” she said.

Check Point Research demonstrated the attack with file-creation payloads and reverse shell payloads, both of which executed without user prompts. In one demonstration, the researchers caused the calculator application to open on a victim’s machine, showing how the vulnerability could be weaponized for more serious attacks.

The flaw created persistent backdoors because trust was bound to the configuration file’s location rather than its contents. An initially innocuous configuration could be swapped for a malicious one after approval or merge, creating a stealthy supply chain backdoor that triggered during normal developer workflows.

The attack required minimal sophistication. An attacker with repository write access or the ability to submit a pull request could embed commands in configuration files. When developers cloned or updated the project and ran Codex, the malicious commands would execute immediately in the user’s security context. This gave attackers access to cloud credentials, SSH keys and source code typically stored on developer machines.

Trey Ford, chief strategy and trust officer at Bugcrowd, said Codex CLI is part of a growing class of tools showing similar security patterns. “We saw this same pattern identified in Cursor by Oasis Security in September,” he told ISMG.

As AI capabilities become more deeply embedded in development environments, vendors face an old but heightened tension: making systems frictionless for adoption while maintaining hardened, enterprise-grade defaults.

“The magic of shortening time-to-value drives adoption,” Ford said. “But as companies scale and pick up increasingly interesting users, those tradeoffs tip over and security hardening naturally becomes a priority.” He added that both vendors and adopters need to scrutinize the security posture of these tools. “The enterprise security capabilities of these development tools need a hard look, while adopting security teams should be watching these attack patterns specifically.”

The vulnerability carried supply chain implications beyond individual compromises. Contaminated starter repositories, project templates or popular open-source projects could weaponize downstream consumers with a single commit. If continuous integration systems or build agents ran Codex on checked-out code, the compromise could propagate from workstations into build artifacts and production deployments.





Source link

Tags: bugCodexCommandsExecuteFilesHiddenRepo
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

UK Hospital Asks Court to Stymie Ransomware Data Leak
Data Breach

UK Hospital Asks Court to Stymie Ransomware Data Leak

December 8, 2025
These five countries recorded the most third-party data breaches last year
Data Breach

These five countries recorded the most third-party data breaches last year

December 8, 2025
LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net
Data Breach

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

December 7, 2025
Rethinking the CIO-CISO Dynamic in the Age of AI
Data Breach

Rethinking the CIO-CISO Dynamic in the Age of AI

December 6, 2025
NHS supplier hit with £3m fine for security failings that led to attack
Data Breach

NHS supplier hit with £3m fine for security failings that led to attack

December 6, 2025
HHS Outlines AI Road Map Amid Major Department Overhaul
Data Breach

HHS Outlines AI Road Map Amid Major Department Overhaul

December 5, 2025
Next Post
Cyber Crime 1930 me Compliant karne ke baad police ghar par aati hai kya? #onlinefraudsekaisebache

Cyber Crime 1930 me Compliant karne ke baad police ghar par aati hai kya? #onlinefraudsekaisebache

CS50 Cybersecurity – Lecture 3 – Securing Software

CS50 Cybersecurity - Lecture 3 - Securing Software

Recommended Stories

AI-Driven Cybersecurity Requires Skilled Human Oversight

Here’s What GPA You Need To Study In The Cybersecurity Field

December 6, 2025
Pros and Cons of a Career in Cybersecurity

Pros and Cons of a Career in Cybersecurity

October 22, 2025
Why Your Business Needs Endpoint Security –

Why Your Business Needs Endpoint Security –

October 15, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested