Anthropic Silently Patches Claude Code Sandbox Bypass
A vulnerability in Anthropic's Claude Code network sandbox allowed bypassing its outbound traffic restrictions via a SOCKS5 hostname null-byte injection. This flaw enabled attackers to circumvent the sandbox's allowlist proxy, potentially facilitating data exfiltration when chained with prompt injection attacks. The issue was present from the sandbox's general availability in October 2025 until fixed in a release in late March 2026. Anthropic patched the vulnerability before public disclosure but did not assign a CVE or prominently notify users. The vulnerability was marked as a duplicate by Anthropic and fixed in the 'sandbox-runtime' library, which may have limited user awareness of the risk and fix. No known exploits in the wild have been reported.
AI Analysis
Technical Summary
Anthropic's Claude Code network sandbox funnels outbound traffic through a local allowlist proxy to block unapproved connections. A vulnerability involving a SOCKS5 hostname null-byte injection allowed attackers to bypass this filter by appending a null byte to a hostname, causing the OS to truncate the string and connect to an unauthorized host. This bypass existed from October 20, 2025, until fixed in version 2.1.88 released on March 31, 2026. The vulnerability was reported through Anthropic's bug bounty program but was already patched prior to the report. Anthropic did not assign a CVE or include the fix in release notes, and the patch was applied to the underlying 'sandbox-runtime' library rather than Claude Code itself. The bypass could have been exploited in combination with prompt injection attacks to exfiltrate sensitive data such as environment variables and credentials.
Potential Impact
The vulnerability allowed attackers to bypass network sandbox restrictions designed to limit outbound connections, potentially enabling unauthorized data exfiltration. When combined with prompt injection attacks, it could have exposed environment variables, credentials, tokens, and infrastructure data. However, there are no reports of active exploitation in the wild. The patch was released before public disclosure, reducing the risk to users who applied updates promptly. Lack of clear communication and CVE assignment may have delayed user awareness and mitigation.
Mitigation Recommendations
Anthropic fixed the vulnerability in Claude Code version 2.1.88 released on March 31, 2026, by updating the underlying sandbox-runtime library. Users should ensure they are running version 2.1.88 or later to be protected. Since the service is not cloud-hosted, manual updates are required. Anthropic did not provide a CVE or detailed release notes for this fix, so users should verify their version and update accordingly. No additional mitigation actions are indicated by the vendor.
Anthropic Silently Patches Claude Code Sandbox Bypass
Description
A vulnerability in Anthropic's Claude Code network sandbox allowed bypassing its outbound traffic restrictions via a SOCKS5 hostname null-byte injection. This flaw enabled attackers to circumvent the sandbox's allowlist proxy, potentially facilitating data exfiltration when chained with prompt injection attacks. The issue was present from the sandbox's general availability in October 2025 until fixed in a release in late March 2026. Anthropic patched the vulnerability before public disclosure but did not assign a CVE or prominently notify users. The vulnerability was marked as a duplicate by Anthropic and fixed in the 'sandbox-runtime' library, which may have limited user awareness of the risk and fix. No known exploits in the wild have been reported.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Anthropic's Claude Code network sandbox funnels outbound traffic through a local allowlist proxy to block unapproved connections. A vulnerability involving a SOCKS5 hostname null-byte injection allowed attackers to bypass this filter by appending a null byte to a hostname, causing the OS to truncate the string and connect to an unauthorized host. This bypass existed from October 20, 2025, until fixed in version 2.1.88 released on March 31, 2026. The vulnerability was reported through Anthropic's bug bounty program but was already patched prior to the report. Anthropic did not assign a CVE or include the fix in release notes, and the patch was applied to the underlying 'sandbox-runtime' library rather than Claude Code itself. The bypass could have been exploited in combination with prompt injection attacks to exfiltrate sensitive data such as environment variables and credentials.
Potential Impact
The vulnerability allowed attackers to bypass network sandbox restrictions designed to limit outbound connections, potentially enabling unauthorized data exfiltration. When combined with prompt injection attacks, it could have exposed environment variables, credentials, tokens, and infrastructure data. However, there are no reports of active exploitation in the wild. The patch was released before public disclosure, reducing the risk to users who applied updates promptly. Lack of clear communication and CVE assignment may have delayed user awareness and mitigation.
Mitigation Recommendations
Anthropic fixed the vulnerability in Claude Code version 2.1.88 released on March 31, 2026, by updating the underlying sandbox-runtime library. Users should ensure they are running version 2.1.88 or later to be protected. Since the service is not cloud-hosted, manual updates are required. Anthropic did not provide a CVE or detailed release notes for this fix, so users should verify their version and update accordingly. No additional mitigation actions are indicated by the vendor.
Technical Details
- Article Source
- {"url":"https://www.securityweek.com/anthropic-silently-patches-claude-code-sandbox-bypass/","fetched":true,"fetchedAt":"2026-05-20T13:03:32.797Z","wordCount":1202}
Threat ID: 6a0db124ba1db473627db5e4
Added to database: 5/20/2026, 1:03:32 PM
Last enriched: 5/20/2026, 1:03:45 PM
Last updated: 5/20/2026, 2:19:32 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.