CVE-2025-66032
- EPSS 0.14%
- Veröffentlicht 03.12.2025 18:16:54
- Zuletzt bearbeitet 05.12.2025 16:29:42
Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploit...
CVE-2025-64755
- EPSS 0.08%
- Veröffentlicht 21.11.2025 01:13:05
- Zuletzt bearbeitet 04.12.2025 18:03:51
Claude Code is an agentic coding tool. Prior to version 2.0.31, due to an error in sed command parsing, it was possible to bypass the Claude Code read-only validation and write to arbitrary files on the host system. This issue has been patched in ver...
CVE-2025-65099
- EPSS 0.1%
- Veröffentlicht 19.11.2025 17:35:17
- Zuletzt bearbeitet 25.11.2025 19:32:20
Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust d...
CVE-2025-59829
- EPSS 0.05%
- Veröffentlicht 03.10.2025 20:03:02
- Zuletzt bearbeitet 24.10.2025 19:45:17
Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, ...
CVE-2025-59536
- EPSS 0.07%
- Veröffentlicht 03.10.2025 06:34:48
- Zuletzt bearbeitet 23.10.2025 12:46:37
Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due to a bug in the startup trust dialog implementation. Claude Code could be tricked to execute code contained in a project before the user accepted the...
CVE-2025-59828
- EPSS 0.06%
- Veröffentlicht 24.09.2025 20:15:33
- Zuletzt bearbeitet 26.11.2025 17:01:17
Claude Code is an agentic coding tool. Prior to Claude Code version 1.0.39, when using Claude Code with Yarn versions 2.0+, Yarn plugins are auto-executed when running yarn --version. This could lead to a bypass of the directory trust dialog in Claud...
CVE-2025-59041
- EPSS 0.12%
- Veröffentlicht 10.09.2025 15:07:50
- Zuletzt bearbeitet 22.10.2025 18:40:53
Claude Code is an agentic coding tool. At startup, Claude Code executed a command templated in with `git config user.email`. Prior to version 1.0.105, a maliciously configured user email in git could be used to trigger arbitrary code execution before...
CVE-2025-58764
- EPSS 0.16%
- Veröffentlicht 10.09.2025 15:06:30
- Zuletzt bearbeitet 24.10.2025 14:46:37
Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 were vulnerable to a bypass of the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires th...
CVE-2025-55284
- EPSS 0.05%
- Veröffentlicht 16.08.2025 01:27:29
- Zuletzt bearbeitet 24.10.2025 14:53:13
Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe...
CVE-2025-54794
- EPSS 0.03%
- Veröffentlicht 05.08.2025 00:08:13
- Zuletzt bearbeitet 27.10.2025 18:01:20
Claude Code is an agentic coding tool. In versions below 0.2.111, a path validation flaw using prefix matching instead of canonical path comparison, makes it possible to bypass directory restrictions and access files outside the CWD. Successful explo...