In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Zsh | Zsh | * | 5.8.1 (excluding) | 
| Red Hat Enterprise Linux 8 | RedHat | zsh-0:5.5.1-9.el8 | * | 
| Red Hat Enterprise Linux 8 | RedHat | zsh-0:5.5.1-9.el8 | * | 
| Zsh | Ubuntu | bionic | * | 
| Zsh | Ubuntu | esm-infra/bionic | * | 
| Zsh | Ubuntu | esm-infra/focal | * | 
| Zsh | Ubuntu | esm-infra/xenial | * | 
| Zsh | Ubuntu | focal | * | 
| Zsh | Ubuntu | impish | * | 
| Zsh | Ubuntu | trusty | * | 
| Zsh | Ubuntu | upstream | * | 
| Zsh | Ubuntu | xenial | * |