CVE-2025-66032
BaseFortify
Publication date: 2025-12-03
Last updated on: 2025-12-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| anthropic | claude_code | to 1.0.93 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Claude Code versions prior to 1.0.93 involves errors in parsing shell commands related to $IFS and short CLI flags. These errors allow an attacker to bypass the read-only validation mechanism and execute arbitrary code. Exploiting this vulnerability requires the attacker to be able to add untrusted content into a Claude Code context window.
How can this vulnerability impact me? :
The vulnerability can lead to arbitrary code execution within Claude Code, which means an attacker could run malicious commands or code on the affected system. This could compromise system integrity, confidentiality, and availability, potentially leading to unauthorized access, data loss, or system disruption.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Claude Code to version 1.0.93 or later, as this version contains the fix for the vulnerability that allows bypassing read-only validation and arbitrary code execution.