Anthropic Claude Code vulnerabilities

23 known vulnerabilities affecting anthropic/claude_code.

Total CVEs
23
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH19MEDIUM1LOW2

Vulnerabilities

Page 1 of 2
CVE-2026-35022CRITICALCVSS 9.3≤ 2.1.912026-04-06
CVE-2026-35022 [CRITICAL] CWE-78 CVE-2026-35022: Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in auth Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without input validation. Attackers who can influence authentication settings can inject shell metacharacters through parameters like apiKeyHelper, awsAuthRef
nvd
CVE-2026-35020HIGHCVSS 8.6≤ 2.1.912026-04-06
CVE-2026-35020 [HIGH] CWE-78 CVE-2026-35020: Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL environment variable. Attackers can inject shell metacharacters into the TERMINAL variable which are interpreted b
nvd
CVE-2026-35021HIGHCVSS 8.4≤ 2.1.912026-04-06
CVE-2026-35021 [HIGH] CWE-78 CVE-2026-35021: Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell metacharacters such as $() or backtick expressions into file paths that are interpolated into shell commands
nvd
CVE-2026-33068HIGHCVSS 7.7fixed in 2.1.532026-03-20
CVE-2026-33068 [HIGH] CWE-807 CVE-2026-33068: Claude Code is an agentic coding tool. Versions prior to 2.1.53 resolved the permission mode from se Claude Code is an agentic coding tool. Versions prior to 2.1.53 resolved the permission mode from settings files, including the repo-controlled .claude/settings.json, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set permissions.defaultMode to bypassPermissions in its committed .claude/sett
nvd
CVE-2026-25723HIGHCVSS 7.7fixed in 2.0.552026-02-06
CVE-2026-25723 [HIGH] CWE-20 CVE-2026-25723: Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly valid Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this
nvd
CVE-2026-25722HIGHCVSS 7.7fixed in 2.0.572026-02-06
CVE-2026-25722 [HIGH] CWE-20 CVE-2026-25722: Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly valid Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the cd command to navigate into sensitive directories like .claude, it was possible to bypass write protection and create or modify files without user confirmation.
nvd
CVE-2026-25725HIGHCVSS 7.7fixed in 2.1.22026-02-06
CVE-2026-25725 [HIGH] CWE-501 CVE-2026-25725: Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing m Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was mounted as writable and .claude/settings.local.json was explicitly protected with read-only constraints, se
nvd
CVE-2026-25724LOWCVSS 2.3fixed in 2.1.72026-02-06
CVE-2026-25724 [LOW] CWE-61 CVE-2026-25724: Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforc Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (such as /etc/passwd) and Claude Code had access to a symbolic link pointing to that file, it was possible for C
nvd
CVE-2026-24052HIGHCVSS 7.1fixed in 1.0.1112026-02-03
CVE-2026-24052 [HIGH] CWE-601 CVE-2026-24052: Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a startsWith() function to validate trusted domains (e.g., docs.python.org, modelcontextprotocol.io), this could have enabled attackers to register do
nvd
CVE-2026-24053HIGHCVSS 7.7fixed in 2.0.742026-02-03
CVE-2026-24053 [HIGH] CWE-22 CVE-2026-24053: Claude Code is an agentic coding tool. Prior to version 2.0.74, due to a Bash command validation fla Claude Code is an agentic coding tool. Prior to version 2.0.74, due to a Bash command validation flaw in parsing ZSH clobber syntax, it was possible to bypass directory restrictions and write files outside the current working directory without user permission prompts. Exploiting this required the user to use ZSH and the ability to add untrusted content
nvd
CVE-2026-24887HIGHCVSS 7.7fixed in 2.0.722026-02-03
CVE-2026-24887 [HIGH] CWE-78 CVE-2026-24887: Claude Code is an agentic coding tool. Prior to version 2.0.72, due to an error in command parsing, Claude Code is an agentic coding tool. Prior to version 2.0.72, due to an error in command parsing, it was possible to bypass the Claude Code confirmation prompt to trigger execution of untrusted commands through the find command. Reliably exploiting this required the ability to add untrusted content into a Claude Code context window. This issue has bee
nvd
CVE-2026-21852MEDIUMCVSS 5.3fixed in 2.0.652026-01-21
CVE-2026-21852 [MEDIUM] CWE-522 CVE-2026-21852: Claude Code is an agentic coding tool. Prior to version 2.0.65, vulnerability in Claude Code's proje Claude Code is an agentic coding tool. Prior to version 2.0.65, vulnerability in Claude Code's project-load flow allowed malicious repositories to exfiltrate data including Anthropic API keys before users confirmed trust. An attacker-controlled repository could include a settings file that sets ANTHROPIC_BASE_URL to an attacker-controlled endpoint a
nvd
CVE-2025-66032HIGHCVSS 8.7fixed in 1.0.932025-12-03
CVE-2025-66032 [HIGH] CWE-77 CVE-2025-66032: Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands rela Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. This vulnerabi
nvd
CVE-2025-64755HIGHCVSS 8.7fixed in 2.0.312025-11-21
CVE-2025-64755 [HIGH] CWE-78 CVE-2025-64755: Claude Code is an agentic coding tool. Prior to version 2.0.31, due to an error in sed command parsi Claude Code is an agentic coding tool. Prior to version 2.0.31, due to an error in sed command parsing, it was possible to bypass the Claude Code read-only validation and write to arbitrary files on the host system. This issue has been patched in version 2.0.31.
nvd
CVE-2025-65099HIGHCVSS 7.7fixed in 1.0.392025-11-19
CVE-2025-65099 [HIGH] CWE-94 CVE-2025-65099: Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust dialog. Exploiting this would have required a user to start Claude Code in an untrusted directory and to b
nvd
CVE-2025-59536HIGHCVSS 8.7fixed in 1.0.1112025-10-03
CVE-2025-59536 [HIGH] CWE-94 CVE-2025-59536: Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due to a bug in the startup trust dialog implementation. Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. U
nvd
CVE-2025-59829LOWCVSS 2.3fixed in 1.0.1202025-10-03
CVE-2025-59829 [LOW] CWE-61 CVE-2025-59829: Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when ch Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, it was possible for Claude Code to access the file. Users on standard Claude Code auto-update will have r
nvd
CVE-2025-59828HIGHCVSS 7.7fixed in 1.0.392025-09-24
CVE-2025-59828 [HIGH] CWE-829 CVE-2025-59828: Claude Code is an agentic coding tool. Prior to Claude Code version 1.0.39, when using Claude Code w Claude Code is an agentic coding tool. Prior to Claude Code version 1.0.39, when using Claude Code with Yarn versions 2.0+, Yarn plugins are auto-executed when running yarn --version. This could lead to a bypass of the directory trust dialog in Claude Code, as plugins would be executed prior to the user accepting the risks of working in an untrusted d
nvd
CVE-2025-59041HIGHCVSS 8.7fixed in 1.0.1052025-09-10
CVE-2025-59041 [HIGH] CWE-94 CVE-2025-59041: Claude Code is an agentic coding tool. At startup, Claude Code executed a command templated in with Claude Code is an agentic coding tool. At startup, Claude Code executed a command templated in with `git config user.email`. Prior to version 1.0.105, a maliciously configured user email in git could be used to trigger arbitrary code execution before a user accepted the workspace trust dialog. Users on standard Claude Code auto-update will have received
nvd
CVE-2025-58764HIGHCVSS 8.7fixed in 1.0.1052025-09-10
CVE-2025-58764 [HIGH] CWE-94 CVE-2025-58764: Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 were vulnerable to a bypass of the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto
nvd