CVE-2026-34450
Received Received - Intake
Insecure File Permissions in Claude SDK Memory Tool Enables Data Exposure

Publication date: 2026-03-31

Last updated on: 2026-04-13

Assigner: GitHub, Inc.

Description
The Claude SDK for Python provides access to the Claude API from Python applications. From version 0.86.0 to before version 0.87.0, the local filesystem memory tool in the Anthropic Python SDK created memory files with mode 0o666, leaving them world-readable on systems with a standard umask and world-writable in environments with a permissive umask such as many Docker base images. A local attacker on a shared host could read persisted agent state, and in containerized deployments could modify memory files to influence subsequent model behavior. Both the synchronous and asynchronous memory tool implementations were affected. This issue has been patched in version 0.87.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anthropic claude_sdk_for_python From 0.86.0 (inc) to 0.87.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the Claude SDK for Python versions from 0.86.0 up to but not including 0.87.0. The local filesystem memory tool created memory files with permissions set to 0o666, which means these files were world-readable and potentially world-writable depending on the system's umask settings. On shared hosts, this allowed local attackers to read persisted agent state data. In containerized environments, such as Docker, attackers could modify these memory files, potentially influencing the behavior of subsequent model operations. Both synchronous and asynchronous memory tool implementations were affected. This issue was fixed in version 0.87.0.


How can this vulnerability impact me? :

This vulnerability can impact you by exposing sensitive persisted agent state data to unauthorized local users on shared systems, compromising confidentiality. In containerized deployments, attackers could modify memory files, potentially altering the behavior of the AI model, which could lead to incorrect or malicious outputs. This could undermine the integrity and reliability of applications using the affected SDK versions.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability has been patched in version 0.87.0 of the Claude SDK for Python. To mitigate this vulnerability, you should upgrade the Anthropic Python SDK to version 0.87.0 or later.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows local attackers on shared hosts to read persisted agent state files that are world-readable and, in containerized environments with permissive umasks, to modify these files. This exposure of potentially sensitive data could lead to unauthorized access to information, which may conflict with data protection requirements in standards like GDPR and HIPAA that mandate strict controls over personal and sensitive data.

By leaving memory files world-readable and potentially world-writable, the vulnerability increases the risk of data leakage and unauthorized data modification, which could undermine compliance with confidentiality and integrity requirements in these regulations.

The issue has been patched in version 0.87.0, so updating to this version or later is necessary to mitigate these compliance risks.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the creation of memory files with insecure permissions (mode 0o666) by the local filesystem memory tool in the Anthropic Python SDK versions 0.86.0 to before 0.87.0. To detect this vulnerability on your system, you can check for files created by the Anthropic Claude SDK memory tool that have world-readable or world-writable permissions.

For example, you can use the following command to find files with permissions 666 (rw-rw-rw-) or more permissive in directories where the SDK might store memory files:

  • find /path/to/sdk/memory/files -type f \( -perm 0666 -o -perm -o+w \) -ls

Replace "/path/to/sdk/memory/files" with the actual path where the Anthropic SDK stores its memory files. If you are unsure, you might search your filesystem for recently modified files with these permissions:

  • find / -type f \( -perm 0666 -o -perm -o+w \) -mtime -30 -ls

This command lists files with world-readable or writable permissions modified in the last 30 days, which might help identify vulnerable files.

Additionally, verifying the installed version of the Anthropic Claude SDK can help confirm if the vulnerability is present:

  • pip show anthropic-claude-sdk

Ensure the version is 0.87.0 or later to have the patch applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart