CVE-2025-59829: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, it was possible for Claude Code to access the file. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version. This issue is fixed in version 1.0.120.
AI Analysis
Technical Summary
CVE-2025-59829 is a vulnerability identified in the anthropics claude-code agentic coding tool, specifically affecting versions prior to 1.0.120. The issue arises from improper handling of UNIX symbolic links (symlinks) in the context of permission deny rules. Claude Code's permission system is designed to restrict access to certain files based on user-defined deny rules. However, in affected versions, the software failed to correctly account for symlinks when enforcing these rules. This means that if a user explicitly denied Claude Code access to a particular file, but Claude Code had access to a symlink pointing to that file, the tool could bypass the deny rule and access the file indirectly through the symlink. This behavior constitutes a security flaw categorized under CWE-61, which concerns improper handling of symbolic links leading to potential unauthorized file access. The vulnerability is network exploitable (AV:N), requires low attack complexity (AC:L), and involves partial user interaction (UI:P). No privileges are required (PR:N), but partial attack traceability (AT:P) is noted. The impact on confidentiality and integrity is low, with no impact on availability. The issue was resolved in version 1.0.120, and users employing the standard auto-update mechanism would have received the fix automatically. Manual updaters are advised to upgrade promptly. No known exploits are currently reported in the wild, and the CVSS v4.0 base score is 2.3, indicating a low severity level. This vulnerability primarily affects UNIX-like operating systems where symlinks are commonly used and where claude-code is deployed. The flaw could allow unauthorized reading of files that users intended to restrict, potentially exposing sensitive data or violating privacy policies, depending on the files accessed.
Potential Impact
For European organizations, the impact of CVE-2025-59829 is generally low but context-dependent. Organizations using anthropics claude-code in development or production environments on UNIX-based systems could face unauthorized access to files that were explicitly denied by users. This could lead to inadvertent exposure of sensitive source code, configuration files, or other proprietary data. While the vulnerability does not allow privilege escalation or denial of service, the unauthorized file access could undermine confidentiality and trust in internal security controls. Given the low CVSS score and no known active exploitation, the immediate risk is limited. However, organizations with strict data protection requirements under regulations such as GDPR should consider the potential for data leakage as a compliance concern. The vulnerability's reliance on symlink manipulation means that attackers would need some level of access to create or control symlinks in the environment, which may limit exploitation scenarios. Nonetheless, in multi-user or shared development environments common in European enterprises, this could be a vector for insider threats or lateral movement. Overall, the impact is low but should not be ignored in sensitive or regulated sectors.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Ensure all instances of anthropics claude-code are updated to version 1.0.120 or later, especially those updated manually. 2) Audit and restrict user permissions to prevent unauthorized creation or manipulation of symlinks in directories accessed by claude-code, reducing the risk of symlink-based bypass. 3) Implement file system monitoring to detect unusual symlink creation or access patterns that could indicate exploitation attempts. 4) Employ application whitelisting and sandboxing techniques to limit claude-code's file system access strictly to necessary directories. 5) Review and tighten deny rule configurations within claude-code to ensure they are comprehensive and tested against symlink scenarios. 6) Educate developers and system administrators about the risks of symlink attacks and encourage secure coding and deployment practices. 7) Integrate vulnerability scanning and patch management processes to promptly identify and remediate outdated claude-code versions. These steps go beyond generic advice by focusing on symlink-specific controls and operational practices tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2025-59829: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
Description
Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, it was possible for Claude Code to access the file. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version. This issue is fixed in version 1.0.120.
AI-Powered Analysis
Technical Analysis
CVE-2025-59829 is a vulnerability identified in the anthropics claude-code agentic coding tool, specifically affecting versions prior to 1.0.120. The issue arises from improper handling of UNIX symbolic links (symlinks) in the context of permission deny rules. Claude Code's permission system is designed to restrict access to certain files based on user-defined deny rules. However, in affected versions, the software failed to correctly account for symlinks when enforcing these rules. This means that if a user explicitly denied Claude Code access to a particular file, but Claude Code had access to a symlink pointing to that file, the tool could bypass the deny rule and access the file indirectly through the symlink. This behavior constitutes a security flaw categorized under CWE-61, which concerns improper handling of symbolic links leading to potential unauthorized file access. The vulnerability is network exploitable (AV:N), requires low attack complexity (AC:L), and involves partial user interaction (UI:P). No privileges are required (PR:N), but partial attack traceability (AT:P) is noted. The impact on confidentiality and integrity is low, with no impact on availability. The issue was resolved in version 1.0.120, and users employing the standard auto-update mechanism would have received the fix automatically. Manual updaters are advised to upgrade promptly. No known exploits are currently reported in the wild, and the CVSS v4.0 base score is 2.3, indicating a low severity level. This vulnerability primarily affects UNIX-like operating systems where symlinks are commonly used and where claude-code is deployed. The flaw could allow unauthorized reading of files that users intended to restrict, potentially exposing sensitive data or violating privacy policies, depending on the files accessed.
Potential Impact
For European organizations, the impact of CVE-2025-59829 is generally low but context-dependent. Organizations using anthropics claude-code in development or production environments on UNIX-based systems could face unauthorized access to files that were explicitly denied by users. This could lead to inadvertent exposure of sensitive source code, configuration files, or other proprietary data. While the vulnerability does not allow privilege escalation or denial of service, the unauthorized file access could undermine confidentiality and trust in internal security controls. Given the low CVSS score and no known active exploitation, the immediate risk is limited. However, organizations with strict data protection requirements under regulations such as GDPR should consider the potential for data leakage as a compliance concern. The vulnerability's reliance on symlink manipulation means that attackers would need some level of access to create or control symlinks in the environment, which may limit exploitation scenarios. Nonetheless, in multi-user or shared development environments common in European enterprises, this could be a vector for insider threats or lateral movement. Overall, the impact is low but should not be ignored in sensitive or regulated sectors.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Ensure all instances of anthropics claude-code are updated to version 1.0.120 or later, especially those updated manually. 2) Audit and restrict user permissions to prevent unauthorized creation or manipulation of symlinks in directories accessed by claude-code, reducing the risk of symlink-based bypass. 3) Implement file system monitoring to detect unusual symlink creation or access patterns that could indicate exploitation attempts. 4) Employ application whitelisting and sandboxing techniques to limit claude-code's file system access strictly to necessary directories. 5) Review and tighten deny rule configurations within claude-code to ensure they are comprehensive and tested against symlink scenarios. 6) Educate developers and system administrators about the risks of symlink attacks and encourage secure coding and deployment practices. 7) Integrate vulnerability scanning and patch management processes to promptly identify and remediate outdated claude-code versions. These steps go beyond generic advice by focusing on symlink-specific controls and operational practices tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-22T14:34:03.471Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e02d46436ecd09b3607b5b
Added to database: 10/3/2025, 8:08:38 PM
Last enriched: 10/3/2025, 8:09:11 PM
Last updated: 10/3/2025, 9:17:05 PM
Views: 4
Related Threats
CVE-2025-61681: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xuemian168 kuno
MediumCVE-2025-61680: CWE-256: Plaintext Storage of a Password in jaketcooper Minecraft-rcon
MediumCVE-2025-61679: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in julien040 anyquery
HighCVE-2025-61677: CWE-502: Deserialization of Untrusted Data in iterative datachain
LowCVE-2025-61673: CWE-306: Missing Authentication for Critical Function in Aiven-Open karapace
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.