Anthropic-Ai Claude-Code vulnerabilities
23 known vulnerabilities affecting anthropic-ai/claude-code.
Total CVEs
23
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH19MEDIUM2LOW2
Vulnerabilities
Page 1 of 2
CVE-2026-39861HIGH≥ 0, < 2.1.642026-04-21
CVE-2026-39861 [HIGH] CWE-22 Claude Code: Sandbox Escape via Symlink Following Allows Arbitrary File Write Outside Workspace
Claude Code: Sandbox Escape via Symlink Following Allows Arbitrary File Write Outside Workspace
Claude Code's sandbox did not prevent sandboxed processes from creating symlinks pointing to locations outside the workspace. When Claude Code subsequently wrote to a path within such a symlink, its unsandboxed process followed the symlink and wrote to the target location outsi
ghsa
CVE-2026-35603MEDIUM≥ 0, < 2.1.752026-04-17
CVE-2026-35603 [MEDIUM] CWE-426 Claude Code: Insecure System-Wide Configuration Loading Enables Local Privilege Escalation on Windows
Claude Code: Insecure System-Wide Configuration Loading Enables Local Privilege Escalation on Windows
On Windows, Claude Code loaded system-wide default configuration from `C:\ProgramData\ClaudeCode\managed-settings.json` without validating directory ownership or access permissions. Because the `ProgramData` directory is writable by non-administrative users by de
ghsa
CVE-2026-33068HIGH≥ 0, < 2.1.532026-03-19
CVE-2026-33068 [HIGH] CWE-807 Claude Code has a Workspace Trust Dialog Bypass via Repo-Controlled Settings File
Claude Code has a Workspace Trust Dialog Bypass via Repo-Controlled Settings File
Claude Code resolved the permission mode from settings files, including the repo-controlled `.claude/settings.json`, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set `permissions.defaultMode` to `bypassPermissions` in its committed `.claude/s
ghsaosv
CVE-2026-25722HIGH≥ 0, < 2.0.572026-02-06
CVE-2026-25722 [HIGH] CWE-20 Claude Code Vulnerable to Command Injection via Directory Change Bypasses Write Protection
Claude Code Vulnerable to Command Injection via Directory Change Bypasses Write Protection
Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the `cd` command to navigate into sensitive directories like `.claude`, it was possible to bypass write protection and create or modify files without user confirma
ghsaosv
CVE-2026-25723HIGH≥ 0, < 2.0.552026-02-06
CVE-2026-25723 [HIGH] CWE-20 Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions
Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions
Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope
ghsaosv
CVE-2026-25725HIGH≥ 0, < 2.1.22026-02-06
CVE-2026-25725 [HIGH] CWE-501 Claude Code has Sandbox Escape via Persistent Configuration Injection in settings.json
Claude Code has Sandbox Escape via Persistent Configuration Injection in settings.json
Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was mounted as writable and .claude/settings.local.json was explicitly protected with read-only constraints, setting
ghsaosv
CVE-2026-25724LOW≥ 0, < 2.1.72026-02-06
CVE-2026-25724 [LOW] CWE-285 Claude Code has Permission Deny Bypass Through Symbolic Links
Claude Code has Permission Deny Bypass Through Symbolic Links
Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (such as /etc/passwd) and Claude Code had access to a symbolic link pointing to that file, it was possible for Claude Code to read the restricted file through the sym
ghsaosv
CVE-2026-24052HIGH≥ 0, < 1.0.1112026-02-03
CVE-2026-24052 [HIGH] CWE-601 Claude Code has a Domain Validation Bypass which Allows Automatic Requests to Attacker-Controlled Domains
Claude Code has a Domain Validation Bypass which Allows Automatic Requests to Attacker-Controlled Domains
Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a `startsWith()` function to validate trusted domains (e.g., `docs.python.org`, `modelcontextprotocol.io`), this could
ghsaosv
CVE-2026-24053HIGH≥ 0, < 2.0.742026-02-03
CVE-2026-24053 [HIGH] CWE-22 Claude Code has a Path Restriction Bypass via ZSH Clobber which Allows Arbitrary File Writes
Claude Code has a Path Restriction Bypass via ZSH Clobber which Allows Arbitrary File Writes
Due to a Bash command validation flaw in parsing ZSH clobber syntax, it was possible to bypass directory restrictions and write files outside the current working directory without user permission prompts. Exploiting this required the user to use ZSH and the ability to add untrusted c
ghsaosv
CVE-2026-24887HIGH≥ 0, < 2.0.722026-02-03
CVE-2026-24887 [HIGH] CWE-78 Claude Code has a Command Injection in find Command Bypasses User Approval Prompt
Claude Code has a Command Injection in find Command Bypasses User Approval Prompt
Due to an error in command parsing, it was possible to bypass the Claude Code confirmation prompt to trigger execution of untrusted commands through the find command. Reliably exploiting this required the ability to add untrusted content into a Claude Code context window.
Users on standard Claude Code au
ghsaosv
CVE-2026-21852MEDIUM≥ 0, < 2.0.652026-01-21
CVE-2026-21852 [MEDIUM] CWE-522 Claude Code Leaks Data via Malicious Environment Configuration Before Trust Confirmation
Claude Code Leaks Data via Malicious Environment Configuration Before Trust Confirmation
A vulnerability in Claude Code's project-load flow allowed malicious repositories to exfiltrate data including Anthropic API keys before users confirmed trust. If a user started Claude Code in an attacker-controller repository, and the repository included a settings file that set ANTHROPI
ghsaosv
CVE-2025-66032HIGH≥ 0, < 1.0.932025-12-03
CVE-2025-66032 [HIGH] CWE-20 Claude Code Command Validation Bypass Allows Arbitrary Code Execution
Claude Code Command Validation Bypass Allows Arbitrary Code Execution
Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window.
Users on standard Claude Code auto-update hav
ghsaosv
CVE-2025-64755HIGH≥ 0, < 2.0.312025-11-20
CVE-2025-64755 [HIGH] CWE-78 @anthropic-ai/claude-code has Sed Command Validation Bypass that Allows Arbitrary File Writes
@anthropic-ai/claude-code has Sed Command Validation Bypass that Allows Arbitrary File Writes
Due to an error in sed command parsing, it was possible to bypass the Claude Code read-only validation and write to arbitrary files on the host system.
Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised
ghsaosv
CVE-2025-65099HIGH≥ 0, < 1.0.392025-11-19
CVE-2025-65099 [HIGH] CWE-94 Claude Code vulnerable to command execution prior to startup trust dialog
Claude Code vulnerable to command execution prior to startup trust dialog
When using Claude Code with Yarn installed, Yarn config files can trigger code execution when running yarn --version. This could lead to a bypass of the directory trust dialog in Claude Code, as plugins and yarnPath could be executed prior to the user accepting the risks of working in an untrusted directory. Users on sta
ghsaosv
CVE-2025-59536HIGH≥ 0, < 1.0.1112025-10-03
CVE-2025-59536 [HIGH] CWE-94 Claude Code can execute commands prior to the startup trust dialog
Claude Code can execute commands prior to the startup trust dialog
Due to a bug in the startup trust dialog implementation, Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory.
Users on standard Claude Code auto-update will have received this fix automatic
ghsaosv
CVE-2025-59829LOW≥ 0, < 1.0.1202025-10-03
CVE-2025-59829 [LOW] CWE-61 Claude Code permission deny bypass through symlink
Claude Code permission deny bypass through symlink
Claude Code failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, it was possible for Claude Code to access the file.
Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates
ghsaosv
CVE-2025-59828HIGH≥ 0, < 1.0.392025-09-24
CVE-2025-59828 [HIGH] CWE-829 Claude Code Vulnerable to Arbitrary Code Execution via Plugin Autoloading with Specific Yarn Versions
Claude Code Vulnerable to Arbitrary Code Execution via Plugin Autoloading with Specific Yarn Versions
When using Claude Code with Yarn installed, Yarn config files can trigger code execution when running `yarn --version`. This could lead to a bypass of the directory trust dialog in Claude Code, as plugins and `yarnPath` could be executed prior to the user accepting
ghsaosv
CVE-2025-59041HIGH≥ 0, < 1.0.1052025-09-10
CVE-2025-59041 [HIGH] CWE-78 Claude Code vulnerable to arbitrary code execution caused by maliciously configured git email
Claude Code vulnerable to arbitrary code execution caused by maliciously configured git email
At startup, Claude Code constructed a shell command that interpolated the value of `git config user.email` from the current workspace. If an attacker controlled the repository’s Git config (e.g., via a malicious `.git/config`) and set `user.email` to a crafted payload, the unescape
ghsaosv
CVE-2025-58764HIGH≥ 0, < 1.0.1052025-09-10
CVE-2025-58764 [HIGH] CWE-94 Claude Code rg vulnerability does not protect against approval prompt bypass
Claude Code rg vulnerability does not protect against approval prompt bypass
Due to an error in command parsing, it was possible to bypass the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window.
Users on standard Claude Code auto-update will have received this
ghsaosv
CVE-2025-55284HIGH≥ 0, < 1.0.42025-08-18
CVE-2025-55284 [HIGH] CWE-78 Claude Code's Permissive Default Allowlist Enables Unauthorized File Read and Network Exfiltration in Claude Code
Claude Code's Permissive Default Allowlist Enables Unauthorized File Read and Network Exfiltration in Claude Code
Due to an overly broad allowlist of safe commands, it was possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation. Reliably exploiting this requires the abi
ghsaosv
1 / 2Next →