CVE-2026-25723Improper Input Validation in Claude-code

Severity
7.7HIGHNVD
EPSS
0.1%
top 65.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 6

Description

Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.5

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

NVDanthropic/claude_code< 2.0.55
CVEListV5anthropics/claude-code< 2.0.55

🔴Vulnerability Details

2
GHSA
Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions2026-02-06
OSV
Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions2026-02-06

🕵️Threat Intelligence

9
Wiz
CVE-2026-25723 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-24053 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-33068 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-25722 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-24052 Impact, Exploitability, and Mitigation Steps | Wiz