CVE-2025-58764: CWE-94: Improper Control of Generation of Code ('Code Injection') in anthropics claude-code
Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 were vulnerable to a bypass of the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to version 1.0.105 or the latest version.
AI Analysis
Technical Summary
CVE-2025-58764 is a high-severity vulnerability classified under CWE-94, indicating improper control of code generation, commonly known as code injection. This vulnerability affects the Anthropics product 'Claude Code,' an agentic coding tool designed to assist users in generating and executing code. The flaw exists in versions prior to 1.0.105 due to an error in the command parsing logic. Specifically, this error allows an attacker to bypass the confirmation prompt that normally guards against the execution of untrusted commands. By exploiting this bypass, an attacker can trigger the execution of arbitrary commands within the Claude Code environment without user consent. Exploitation requires the attacker to be able to inject untrusted content into a Claude Code context window, which implies some level of interaction or content insertion capability within the application environment. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:P). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that successful exploitation can lead to full compromise of the affected system. The vulnerability was published on September 10, 2025, and fixed in version 1.0.105. Users with automatic updates enabled have likely received the patch, but manual updaters must upgrade to the fixed version to mitigate the risk. No known exploits are currently reported in the wild, but the nature of the vulnerability and its ease of exploitation make it a significant threat if weaponized.
Potential Impact
For European organizations, the impact of CVE-2025-58764 can be substantial. Claude Code, as an agentic coding tool, is likely used in software development environments, automation, and possibly in continuous integration/continuous deployment (CI/CD) pipelines. Successful exploitation could allow attackers to execute arbitrary code, leading to unauthorized access, data exfiltration, or disruption of development workflows. This could compromise intellectual property, sensitive customer data, or critical infrastructure codebases. Given the high impact on confidentiality, integrity, and availability, organizations could face operational downtime, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The requirement for user interaction means phishing or social engineering could be vectors for exploitation, increasing the risk in environments where developers or operators interact with untrusted inputs. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the vulnerability's characteristics suggest it could be targeted by sophisticated threat actors aiming to compromise software supply chains or internal development environments.
Mitigation Recommendations
European organizations should prioritize updating all instances of Claude Code to version 1.0.105 or later immediately, especially those environments where manual updates are performed. Beyond patching, organizations should implement strict input validation and sanitization controls around any user-generated or external content that could be injected into Claude Code context windows. Restricting access to Claude Code environments to trusted users and networks can reduce the risk of untrusted content injection. Additionally, organizations should enhance monitoring and logging around command execution within Claude Code to detect anomalous or unauthorized activities promptly. Employing endpoint detection and response (EDR) solutions that can identify suspicious command execution patterns will aid in early detection. User training to recognize and avoid social engineering attempts that could lead to injection of malicious content is also critical. Finally, integrating Claude Code usage into the organization's broader software supply chain security strategy will help mitigate risks associated with agentic coding tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-58764: CWE-94: Improper Control of Generation of Code ('Code Injection') in anthropics claude-code
Description
Claude Code is an agentic coding tool. Due to an error in command parsing, versions prior to 1.0.105 were vulnerable to a bypass of the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to version 1.0.105 or the latest version.
AI-Powered Analysis
Technical Analysis
CVE-2025-58764 is a high-severity vulnerability classified under CWE-94, indicating improper control of code generation, commonly known as code injection. This vulnerability affects the Anthropics product 'Claude Code,' an agentic coding tool designed to assist users in generating and executing code. The flaw exists in versions prior to 1.0.105 due to an error in the command parsing logic. Specifically, this error allows an attacker to bypass the confirmation prompt that normally guards against the execution of untrusted commands. By exploiting this bypass, an attacker can trigger the execution of arbitrary commands within the Claude Code environment without user consent. Exploitation requires the attacker to be able to inject untrusted content into a Claude Code context window, which implies some level of interaction or content insertion capability within the application environment. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:P). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that successful exploitation can lead to full compromise of the affected system. The vulnerability was published on September 10, 2025, and fixed in version 1.0.105. Users with automatic updates enabled have likely received the patch, but manual updaters must upgrade to the fixed version to mitigate the risk. No known exploits are currently reported in the wild, but the nature of the vulnerability and its ease of exploitation make it a significant threat if weaponized.
Potential Impact
For European organizations, the impact of CVE-2025-58764 can be substantial. Claude Code, as an agentic coding tool, is likely used in software development environments, automation, and possibly in continuous integration/continuous deployment (CI/CD) pipelines. Successful exploitation could allow attackers to execute arbitrary code, leading to unauthorized access, data exfiltration, or disruption of development workflows. This could compromise intellectual property, sensitive customer data, or critical infrastructure codebases. Given the high impact on confidentiality, integrity, and availability, organizations could face operational downtime, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The requirement for user interaction means phishing or social engineering could be vectors for exploitation, increasing the risk in environments where developers or operators interact with untrusted inputs. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the vulnerability's characteristics suggest it could be targeted by sophisticated threat actors aiming to compromise software supply chains or internal development environments.
Mitigation Recommendations
European organizations should prioritize updating all instances of Claude Code to version 1.0.105 or later immediately, especially those environments where manual updates are performed. Beyond patching, organizations should implement strict input validation and sanitization controls around any user-generated or external content that could be injected into Claude Code context windows. Restricting access to Claude Code environments to trusted users and networks can reduce the risk of untrusted content injection. Additionally, organizations should enhance monitoring and logging around command execution within Claude Code to detect anomalous or unauthorized activities promptly. Employing endpoint detection and response (EDR) solutions that can identify suspicious command execution patterns will aid in early detection. User training to recognize and avoid social engineering attempts that could lead to injection of malicious content is also critical. Finally, integrating Claude Code usage into the organization's broader software supply chain security strategy will help mitigate risks associated with agentic coding tools.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-04T19:18:09.500Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c196ac368ecf244925d85c
Added to database: 9/10/2025, 3:18:04 PM
Last enriched: 9/10/2025, 3:18:31 PM
Last updated: 9/10/2025, 7:52:52 PM
Views: 3
Related Threats
CVE-2025-10218: SQL Injection in lostvip-com ruoyi-go
MediumCVE-2025-10216: Race Condition in GrandNode
LowCVE-2025-43783: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-10211: Server-Side Request Forgery in yanyutao0402 ChanCMS
MediumCVE-2025-54376: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in SpectoLabs hoverfly
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.