CVE-2025-55284
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-16

Last updated on: 2025-10-24

Assigner: GitHub, Inc.

Description
Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe commands. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-16
Last Modified
2025-10-24
Generated
2026-05-07
AI Q&A
2025-08-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anthropic claude_code to 1.0.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Claude Code versions prior to 1.0.4 allows an attacker to bypass confirmation prompts that normally prevent reading files and sending their contents over the network without user approval. This happens because the software's allowlist of safe commands is too broad, enabling unauthorized file access and data exfiltration if untrusted content can be injected into the Claude Code context window.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive files by allowing attackers to read files and send their contents over the network without user consent. This can result in data breaches, loss of confidentiality, and potential exposure of private or sensitive information.


What immediate steps should I take to mitigate this vulnerability?

Ensure that all Claude Code installations are updated to version 1.0.4 or later, as versions prior to 1.0.24 are deprecated and have been forced to update. Users on standard Claude Code auto-update receive this fix automatically. Avoid using vulnerable versions and restrict the ability to add untrusted content into Claude Code context windows.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart