CVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe commands. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update.
AI Analysis
Technical Summary
CVE-2025-55284 is a high-severity OS command injection vulnerability (CWE-78) found in the anthropics Claude Code agentic coding tool, specifically in versions prior to 1.0.4. Claude Code is designed to assist with coding tasks by executing commands, but before version 1.0.4, it contained an overly broad allowlist of safe commands that could be bypassed. This flaw allows an attacker who can inject untrusted content into a Claude Code context window to circumvent the tool's confirmation prompts. By doing so, the attacker can read arbitrary files on the host system and exfiltrate their contents over the network without user approval. The vulnerability does not require any privileges or authentication (AV:N/PR:N), and no user interaction beyond the injection of malicious content is needed (UI:P). The CVSS 4.0 score is 7.1, reflecting a high impact primarily on confidentiality due to unauthorized data disclosure. The vulnerability affects only versions earlier than 1.0.4, and users on standard auto-update paths have been automatically patched. Versions prior to 1.0.24 are deprecated and forced to update, meaning current users should not be vulnerable. There are no known exploits in the wild at this time. The vulnerability arises from improper neutralization of special elements in OS commands, allowing command injection and unauthorized command execution within the Claude Code environment.
Potential Impact
For European organizations using Claude Code versions prior to 1.0.4, this vulnerability poses a significant risk of data confidentiality breaches. An attacker able to inject malicious content into the Claude Code context could read sensitive files and transmit their contents externally without user consent. This could lead to leakage of intellectual property, customer data, or internal configuration files. Since the vulnerability requires no privileges or authentication, any exposed interface or collaborative environment where untrusted input can reach Claude Code is a potential attack vector. The impact on integrity and availability is minimal, as the vulnerability primarily enables data exfiltration rather than system disruption or modification. However, the breach of confidentiality alone can have severe regulatory and reputational consequences under European data protection laws such as GDPR. The automatic update mechanism mitigates risk for most users, but organizations with strict change control or offline environments may remain exposed if they have not updated. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers could develop exploits given the public disclosure.
Mitigation Recommendations
European organizations should ensure that all instances of Claude Code are updated to version 1.0.4 or later immediately. For environments where automatic updates are disabled or controlled, manual patching must be prioritized. Additionally, organizations should audit and restrict the ability to inject untrusted content into Claude Code context windows, for example by limiting access to trusted users and validating or sanitizing inputs that reach the tool. Network monitoring should be enhanced to detect unusual outbound data flows that could indicate exfiltration attempts. Implementing strict access controls and segmentation around systems running Claude Code can reduce exposure. Organizations should also review their incident response plans to include scenarios involving agentic coding tools and command injection attacks. Finally, educating developers and users about the risks of injecting untrusted content into automated coding assistants can help prevent exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
Description
Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe commands. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update.
AI-Powered Analysis
Technical Analysis
CVE-2025-55284 is a high-severity OS command injection vulnerability (CWE-78) found in the anthropics Claude Code agentic coding tool, specifically in versions prior to 1.0.4. Claude Code is designed to assist with coding tasks by executing commands, but before version 1.0.4, it contained an overly broad allowlist of safe commands that could be bypassed. This flaw allows an attacker who can inject untrusted content into a Claude Code context window to circumvent the tool's confirmation prompts. By doing so, the attacker can read arbitrary files on the host system and exfiltrate their contents over the network without user approval. The vulnerability does not require any privileges or authentication (AV:N/PR:N), and no user interaction beyond the injection of malicious content is needed (UI:P). The CVSS 4.0 score is 7.1, reflecting a high impact primarily on confidentiality due to unauthorized data disclosure. The vulnerability affects only versions earlier than 1.0.4, and users on standard auto-update paths have been automatically patched. Versions prior to 1.0.24 are deprecated and forced to update, meaning current users should not be vulnerable. There are no known exploits in the wild at this time. The vulnerability arises from improper neutralization of special elements in OS commands, allowing command injection and unauthorized command execution within the Claude Code environment.
Potential Impact
For European organizations using Claude Code versions prior to 1.0.4, this vulnerability poses a significant risk of data confidentiality breaches. An attacker able to inject malicious content into the Claude Code context could read sensitive files and transmit their contents externally without user consent. This could lead to leakage of intellectual property, customer data, or internal configuration files. Since the vulnerability requires no privileges or authentication, any exposed interface or collaborative environment where untrusted input can reach Claude Code is a potential attack vector. The impact on integrity and availability is minimal, as the vulnerability primarily enables data exfiltration rather than system disruption or modification. However, the breach of confidentiality alone can have severe regulatory and reputational consequences under European data protection laws such as GDPR. The automatic update mechanism mitigates risk for most users, but organizations with strict change control or offline environments may remain exposed if they have not updated. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers could develop exploits given the public disclosure.
Mitigation Recommendations
European organizations should ensure that all instances of Claude Code are updated to version 1.0.4 or later immediately. For environments where automatic updates are disabled or controlled, manual patching must be prioritized. Additionally, organizations should audit and restrict the ability to inject untrusted content into Claude Code context windows, for example by limiting access to trusted users and validating or sanitizing inputs that reach the tool. Network monitoring should be enhanced to detect unusual outbound data flows that could indicate exfiltration attempts. Implementing strict access controls and segmentation around systems running Claude Code can reduce exposure. Organizations should also review their incident response plans to include scenarios involving agentic coding tools and command injection attacks. Finally, educating developers and users about the risks of injecting untrusted content into automated coding assistants can help prevent exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-12T16:15:30.236Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689fe343ad5a09ad00736e25
Added to database: 8/16/2025, 1:47:47 AM
Last enriched: 8/16/2025, 2:02:47 AM
Last updated: 8/18/2025, 9:32:30 AM
Views: 8
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.