CVE-2025-59536
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-23
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| anthropic | claude_code | to 1.0.111 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Code Injection issue in Claude Code versions before 1.0.111. Due to a bug in the startup trust dialog, Claude Code could be tricked into executing code contained in a project before the user accepted the trust dialog. This means that if a user starts Claude Code in an untrusted directory, malicious code could run without explicit user approval.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized code execution on your system if you open Claude Code in an untrusted directory. This could result in malicious actions being performed without your consent, potentially compromising your system's security and data integrity.
What immediate steps should I take to mitigate this vulnerability?
Update Claude Code to version 1.0.111 or later. Users who rely on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates should update to the latest version to mitigate this vulnerability.