Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-xq4m-mc3c-vvg3: Claude Code Command Validation Bypass Allows Arbitrary Code Execution

Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window.

Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.

Thank you to RyotaK from GMO Flatt Security Inc. for reporting this issue!

ghsa
#nodejs#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-66032

Claude Code Command Validation Bypass Allows Arbitrary Code Execution

High severity GitHub Reviewed Published Dec 3, 2025 in anthropics/claude-code • Updated Dec 3, 2025

Package

npm @anthropic-ai/claude-code (npm)

Affected versions

< 1.0.93

Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window.

Users on standard Claude Code auto-update have received this fix already. Users performing manual updates are advised to update to the latest version.

Thank you to RyotaK from GMO Flatt Security Inc. for reporting this issue!

References

  • GHSA-xq4m-mc3c-vvg3

Published to the GitHub Advisory Database

Dec 3, 2025

ghsa: Latest News

GHSA-wvxp-jp4w-w8wg: mcp-server-kubernetes has potential security issue in exec_in_pod tool