Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2jjv-qf24-vfm4

Опубликовано: 24 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 7.7

Описание

Claude Code Vulnerable to Arbitrary Code Execution via Plugin Autoloading with Specific Yarn Versions

When using Claude Code with Yarn installed, Yarn config files can trigger code execution when running yarn --version. This could lead to a bypass of the directory trust dialog in Claude Code, as plugins and yarnPath could be executed prior to the user accepting the risks of working in an untrusted directory. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version.

Thank you to Benjamin Faller, Redguard AG and Michael Hess for reporting this issue!

Пакеты

Наименование

@anthropic-ai/claude-code

npm
Затронутые версииВерсия исправления

< 1.0.39

1.0.39

EPSS

Процентиль: 24%
0.0008
Низкий

7.7 High

CVSS4

Дефекты

CWE-829
CWE-862

Связанные уязвимости

CVSS3: 9.8
nvd
5 месяцев назад

Claude Code is an agentic coding tool. Prior to Claude Code version 1.0.39, when using Claude Code with Yarn versions 2.0+, Yarn plugins are auto-executed when running yarn --version. This could lead to a bypass of the directory trust dialog in Claude Code, as plugins would be executed prior to the user accepting the risks of working in an untrusted directory. Users running Yarn Classic were unaffected by this issue. This issue has been fixed in version 1.0.39. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version.

EPSS

Процентиль: 24%
0.0008
Низкий

7.7 High

CVSS4

Дефекты

CWE-829
CWE-862