Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q728-gf8j-w49r

Опубликовано: 03 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 7.7

Описание

Claude Code has a Path Restriction Bypass via ZSH Clobber which Allows Arbitrary File Writes

Due to a Bash command validation flaw in parsing ZSH clobber syntax, it was possible to bypass directory restrictions and write files outside the current working directory without user permission prompts. Exploiting this required the user to use ZSH and the ability to add untrusted content into a Claude Code context window.

Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.

Claude Code thanks https://hackerone.com/alexbernier for reporting this issue!

Пакеты

Наименование

@anthropic-ai/claude-code

npm
Затронутые версииВерсия исправления

< 2.0.74

2.0.74

EPSS

Процентиль: 5%
0.0002
Низкий

7.7 High

CVSS4

Дефекты

CWE-22
CWE-78

Связанные уязвимости

nvd
4 дня назад

Claude Code is an agentic coding tool. Prior to version 2.0.74, due to a Bash command validation flaw in parsing ZSH clobber syntax, it was possible to bypass directory restrictions and write files outside the current working directory without user permission prompts. Exploiting this required the user to use ZSH and the ability to add untrusted content into a Claude Code context window. This issue has been patched in version 2.0.74.

EPSS

Процентиль: 5%
0.0002
Низкий

7.7 High

CVSS4

Дефекты

CWE-22
CWE-78