Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xq4m-mc3c-vvg3

Опубликовано: 03 дек. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.7

Описание

Claude Code Command Validation Bypass Allows Arbitrary Code Execution

Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window.

Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.

Thank you to RyotaK from GMO Flatt Security Inc. for reporting this issue!

Пакеты

Наименование

@anthropic-ai/claude-code

npm
Затронутые версииВерсия исправления

< 1.0.93

1.0.93

EPSS

Процентиль: 36%
0.00151
Низкий

8.7 High

CVSS4

Дефекты

CWE-20
CWE-77

Связанные уязвимости

CVSS3: 9.8
nvd
2 месяца назад

Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. This vulnerability is fixed in 1.0.93.

EPSS

Процентиль: 36%
0.00151
Низкий

8.7 High

CVSS4

Дефекты

CWE-20
CWE-77