Anthropic

Claude Code

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 03.12.2025 18:16:54
  • Zuletzt bearbeitet 05.12.2025 16:29:42

Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploit...

  • EPSS 0.08%
  • Veröffentlicht 21.11.2025 01:13:05
  • Zuletzt bearbeitet 04.12.2025 18:03:51

Claude Code is an agentic coding tool. Prior to version 2.0.31, due to an error in sed command parsing, it was possible to bypass the Claude Code read-only validation and write to arbitrary files on the host system. This issue has been patched in ver...

  • EPSS 0.1%
  • Veröffentlicht 19.11.2025 17:35:17
  • Zuletzt bearbeitet 25.11.2025 19:32:20

Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust d...

  • EPSS 0.05%
  • Veröffentlicht 03.10.2025 20:03:02
  • Zuletzt bearbeitet 24.10.2025 19:45:17

Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, ...

  • EPSS 0.07%
  • Veröffentlicht 03.10.2025 06:34:48
  • Zuletzt bearbeitet 23.10.2025 12:46:37

Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due to a bug in the startup trust dialog implementation. Claude Code could be tricked to execute code contained in a project before the user accepted the...

  • EPSS 0.06%
  • Veröffentlicht 24.09.2025 20:15:33
  • Zuletzt bearbeitet 26.11.2025 17:01:17

Claude Code is an agentic coding tool. Prior to Claude Code version 1.0.39, when using Claude Code with Yarn versions 2.0+, Yarn plugins are auto-executed when running yarn --version. This could lead to a bypass of the directory trust dialog in Claud...

  • EPSS 0.12%
  • Veröffentlicht 10.09.2025 15:07:50
  • Zuletzt bearbeitet 22.10.2025 18:40:53

Claude Code is an agentic coding tool. At startup, Claude Code executed a command templated in with `git config user.email`. Prior to version 1.0.105, a maliciously configured user email in git could be used to trigger arbitrary code execution before...

  • EPSS 0.16%
  • Veröffentlicht 10.09.2025 15:06:30
  • Zuletzt bearbeitet 24.10.2025 14:46:37

Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 were vulnerable to a bypass of the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires th...

  • EPSS 0.05%
  • Veröffentlicht 16.08.2025 01:27:29
  • Zuletzt bearbeitet 24.10.2025 14:53:13

Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe...

  • EPSS 0.03%
  • Veröffentlicht 05.08.2025 00:08:13
  • Zuletzt bearbeitet 27.10.2025 18:01:20

Claude Code is an agentic coding tool. In versions below 0.2.111, a path validation flaw using prefix matching instead of canonical path comparison, makes it possible to bypass directory restrictions and access files outside the CWD. Successful explo...