Lite XL versions 2.1.8 and prior automatically execute the .lite_project.lua file when opening a project directory, without prompting the user for confirmation. The .lite_project.lua file is intended for project-specific configuration but can contain executable Lua logic. This behavior could allow execution of untrusted Lua code if a user opens a malicious project, potentially leading to arbitrary code execution with the privileges of the Lite XL process.
References
| Link | Resource |
|---|---|
| https://github.com/lite-xl/lite-xl/pull/2164 | Issue Tracking Patch |
| https://kb.cert.org/vuls/id/579478 | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-11-20 17:15
Updated : 2025-12-10 17:47
NVD link : CVE-2025-12120
Mitre link : CVE-2025-12120
CVE.ORG link : CVE-2025-12120
JSON object : View
Products Affected
lite-xl
- lite_xl
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
