A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enables code execution through malicious MCP (Model Context Protocol) configuration files. The attack is triggered when a user runs the codex command inside a malicious or compromised repository. Codex automatically loads project-local .env and .codex/config.toml files without requiring user confirmation, allowing attackers to embed arbitrary commands that execute immediately.
History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title OpenAI Codex CLI Arbitrary Command Execution via Malicious Configuration Files
Weaknesses CWE-78
CWE-94

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Openai
Openai codex
Vendors & Products Openai
Openai codex

Tue, 14 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enables code execution through malicious MCP (Model Context Protocol) configuration files. The attack is triggered when a user runs the codex command inside a malicious or compromised repository. Codex automatically loads project-local .env and .codex/config.toml files without requiring user confirmation, allowing attackers to embed arbitrary commands that execute immediately.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-14T14:14:32.518Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61260

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-14T15:16:24.487

Modified: 2026-04-14T15:16:24.487

Link: CVE-2025-61260

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:31:58Z