CVE-2025-58764
BaseFortify
Publication date: 2025-09-10
Last updated on: 2025-10-24
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| anthropic | claude_code | to 1.0.105 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-58764 is a high-severity command injection vulnerability in the Claude Code tool (npm package @anthropic-ai/claude-code) affecting versions prior to 1.0.105. Due to an error in command parsing, attackers can bypass the user confirmation prompt and execute arbitrary commands without user consent if they can inject untrusted content into a Claude Code context window. This flaw arises from improper handling of externally-influenced input used in code generation (CWE-94). [1]
How can this vulnerability impact me? :
Successful exploitation of this vulnerability can lead to full compromise of system confidentiality, integrity, and availability. Attackers can execute arbitrary commands remotely without privileges, potentially leading to unauthorized data access, modification, or system disruption. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves checking the version of the @anthropic-ai/claude-code package installed on your system. If the version is prior to 1.0.105, the system is vulnerable. You can run commands like `npm list @anthropic-ai/claude-code` or `npm ls @anthropic-ai/claude-code` to determine the installed version. Additionally, monitoring for unexpected or unapproved command executions within Claude Code context windows may indicate exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the @anthropic-ai/claude-code package to version 1.0.105 or later. Users with automatic updates should already have the fix applied. For those performing manual updates, upgrading to the latest version is strongly advised to prevent exploitation. Additionally, avoid allowing untrusted content to be injected into Claude Code context windows to reduce risk. [1]