Anthropics Claude-Code vulnerabilities
23 known vulnerabilities affecting anthropics/claude-code.
Total CVEs
23
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH19MEDIUM2LOW2
Vulnerabilities
Page 1 of 2
CVE-2026-39861HIGHCVSS 7.7fixed in 2.1.642026-04-21
CVE-2026-39861 [HIGH] CWE-22 CVE-2026-39861: Claude Code is an agentic coding tool. Prior to version 2.1.64, Claude Code's sandbox did not preven
Claude Code is an agentic coding tool. Prior to version 2.1.64, Claude Code's sandbox did not prevent sandboxed processes from creating symlinks pointing to locations outside the workspace. When Claude Code subsequently wrote to a path within such a symlink, its unsandboxed process followed the symlink and wrote to the target location outside the works
nvd
CVE-2026-35603MEDIUMCVSS 5.4fixed in 2.1.752026-04-17
CVE-2026-35603 [MEDIUM] CWE-426 CVE-2026-35603: Claude Code is an agentic coding tool. In versions prior to 2.1.75 on Windows, Claude Code loaded th
Claude Code is an agentic coding tool. In versions prior to 2.1.75 on Windows, Claude Code loaded the system-wide default configuration from C:\ProgramData\ClaudeCode\managed-settings.json without validating directory ownership or access permissions. Because the ProgramData directory is writable by non-administrative users by default and the ClaudeC
nvd
CVE-2026-33068HIGHCVSS 7.7fixed in 2.1.532026-03-20
CVE-2026-33068 [HIGH] CWE-807 CVE-2026-33068: Claude Code is an agentic coding tool. Versions prior to 2.1.53 resolved the permission mode from se
Claude Code is an agentic coding tool. Versions prior to 2.1.53 resolved the permission mode from settings files, including the repo-controlled .claude/settings.json, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set permissions.defaultMode to bypassPermissions in its committed .claude/sett
nvd
CVE-2026-25723HIGHCVSS 7.7fixed in 2.0.552026-02-06
CVE-2026-25723 [HIGH] CWE-20 CVE-2026-25723: Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly valid
Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this
nvd
CVE-2026-25722HIGHCVSS 7.7fixed in 2.0.572026-02-06
CVE-2026-25722 [HIGH] CWE-20 CVE-2026-25722: Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly valid
Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the cd command to navigate into sensitive directories like .claude, it was possible to bypass write protection and create or modify files without user confirmation.
nvd
CVE-2026-25725HIGHCVSS 7.7fixed in 2.1.22026-02-06
CVE-2026-25725 [HIGH] CWE-501 CVE-2026-25725: Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing m
Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was mounted as writable and .claude/settings.local.json was explicitly protected with read-only constraints, se
nvd
CVE-2026-25724LOWCVSS 2.3fixed in 2.1.72026-02-06
CVE-2026-25724 [LOW] CWE-61 CVE-2026-25724: Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforc
Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (such as /etc/passwd) and Claude Code had access to a symbolic link pointing to that file, it was possible for C
nvd
CVE-2026-24052HIGHCVSS 7.1fixed in 1.0.1112026-02-03
CVE-2026-24052 [HIGH] CWE-601 CVE-2026-24052: Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient
Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient URL validation in its trusted domain verification mechanism for WebFetch requests. The application used a startsWith() function to validate trusted domains (e.g., docs.python.org, modelcontextprotocol.io), this could have enabled attackers to register do
nvd
CVE-2026-24053HIGHCVSS 7.7fixed in 2.0.742026-02-03
CVE-2026-24053 [HIGH] CWE-22 CVE-2026-24053: Claude Code is an agentic coding tool. Prior to version 2.0.74, due to a Bash command validation fla
Claude Code is an agentic coding tool. Prior to version 2.0.74, due to a Bash command validation flaw in parsing ZSH clobber syntax, it was possible to bypass directory restrictions and write files outside the current working directory without user permission prompts. Exploiting this required the user to use ZSH and the ability to add untrusted content
nvd
CVE-2026-24887HIGHCVSS 7.7fixed in 2.0.722026-02-03
CVE-2026-24887 [HIGH] CWE-78 CVE-2026-24887: Claude Code is an agentic coding tool. Prior to version 2.0.72, due to an error in command parsing,
Claude Code is an agentic coding tool. Prior to version 2.0.72, due to an error in command parsing, it was possible to bypass the Claude Code confirmation prompt to trigger execution of untrusted commands through the find command. Reliably exploiting this required the ability to add untrusted content into a Claude Code context window. This issue has bee
nvd
CVE-2026-21852MEDIUMCVSS 5.3fixed in 2.0.652026-01-21
CVE-2026-21852 [MEDIUM] CWE-522 CVE-2026-21852: Claude Code is an agentic coding tool. Prior to version 2.0.65, vulnerability in Claude Code's proje
Claude Code is an agentic coding tool. Prior to version 2.0.65, vulnerability in Claude Code's project-load flow allowed malicious repositories to exfiltrate data including Anthropic API keys before users confirmed trust. An attacker-controlled repository could include a settings file that sets ANTHROPIC_BASE_URL to an attacker-controlled endpoint a
nvd
CVE-2025-66032HIGHCVSS 8.7fixed in 1.0.932025-12-03
CVE-2025-66032 [HIGH] CWE-77 CVE-2025-66032: Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands rela
Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. This vulnerabi
nvd
CVE-2025-64755HIGHCVSS 8.7fixed in 2.0.312025-11-21
CVE-2025-64755 [HIGH] CWE-78 CVE-2025-64755: Claude Code is an agentic coding tool. Prior to version 2.0.31, due to an error in sed command parsi
Claude Code is an agentic coding tool. Prior to version 2.0.31, due to an error in sed command parsing, it was possible to bypass the Claude Code read-only validation and write to arbitrary files on the host system. This issue has been patched in version 2.0.31.
nvd
CVE-2025-65099HIGHCVSS 7.7fixed in 1.0.392025-11-19
CVE-2025-65099 [HIGH] CWE-94 CVE-2025-65099: Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn
Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust dialog. Exploiting this would have required a user to start Claude Code in an untrusted directory and to b
nvd
CVE-2025-59536HIGHCVSS 8.7fixed in 1.0.1112025-10-03
CVE-2025-59536 [HIGH] CWE-94 CVE-2025-59536: Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due
Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due to a bug in the startup trust dialog implementation. Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. U
nvd
CVE-2025-59829LOWCVSS 2.3fixed in 1.0.1202025-10-03
CVE-2025-59829 [LOW] CWE-61 CVE-2025-59829: Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when ch
Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, it was possible for Claude Code to access the file. Users on standard Claude Code auto-update will have r
nvd
CVE-2025-59828HIGHCVSS 7.7fixed in 1.0.392025-09-24
CVE-2025-59828 [HIGH] CWE-829 CVE-2025-59828: Claude Code is an agentic coding tool. Prior to Claude Code version 1.0.39, when using Claude Code w
Claude Code is an agentic coding tool. Prior to Claude Code version 1.0.39, when using Claude Code with Yarn versions 2.0+, Yarn plugins are auto-executed when running yarn --version. This could lead to a bypass of the directory trust dialog in Claude Code, as plugins would be executed prior to the user accepting the risks of working in an untrusted d
nvd
CVE-2025-59041HIGHCVSS 8.7fixed in 1.0.1052025-09-10
CVE-2025-59041 [HIGH] CWE-94 CVE-2025-59041: Claude Code is an agentic coding tool. At startup, Claude Code executed a command templated in with
Claude Code is an agentic coding tool. At startup, Claude Code executed a command templated in with `git config user.email`. Prior to version 1.0.105, a maliciously configured user email in git could be used to trigger arbitrary code execution before a user accepted the workspace trust dialog. Users on standard Claude Code auto-update will have received
nvd
CVE-2025-58764HIGHCVSS 8.7fixed in 1.0.1052025-09-10
CVE-2025-58764 [HIGH] CWE-94 CVE-2025-58764: Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105
Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 were vulnerable to a bypass of the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto
nvd
CVE-2025-55284HIGHCVSS 7.1fixed in 1.0.42025-08-16
CVE-2025-55284 [HIGH] CWE-78 CVE-2025-55284: Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Co
Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe commands. Reliably exploiting this requires the ability to add untrusted content into a Claude Code con
nvd
1 / 2Next →