Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j4h9-wv2m-wrf7

Опубликовано: 10 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.5

Описание

Claude Code vulnerable to arbitrary code execution caused by maliciously configured git email

At startup, Claude Code constructed a shell command that interpolated the value of git config user.email from the current workspace. If an attacker controlled the repository’s Git config (e.g., via a malicious .git/config) and set user.email to a crafted payload, the unescaped interpolation could trigger arbitrary command execution before the user accepted the workspace-trust dialog. The issue affects versions prior to 1.0.105. The fix in 1.0.105 avoids executing commands built from untrusted configuration and properly validates/escapes inputs.

  • Patches: Update to @anthropic-ai/claude-code 1.0.105 or later.
  • Workarounds: Open only trusted workspaces and inspect repository .git/config before launch; avoid inheriting untrusted Git configuration values.

Thank you to the NVIDIA AI Red Team for reporting this issue!

Пакеты

Наименование

@anthropic-ai/claude-code

npm
Затронутые версииВерсия исправления

< 1.0.105

1.0.105

EPSS

Процентиль: 24%
0.00083
Низкий

8.5 High

CVSS4

Дефекты

CWE-78
CWE-94

Связанные уязвимости

CVSS3: 9.8
nvd
5 месяцев назад

Claude Code is an agentic coding tool. At startup, Claude Code executed a command templated in with `git config user.email`. Prior to version 1.0.105, a maliciously configured user email in git could be used to trigger arbitrary code execution before a user accepted the workspace trust dialog. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to version 1.0.105 or the latest version.

EPSS

Процентиль: 24%
0.00083
Низкий

8.5 High

CVSS4

Дефекты

CWE-78
CWE-94