Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25723: CWE-20: Improper Input Validation in anthropics claude-code

0
High
VulnerabilityCVE-2026-25723cvecve-2026-25723cwe-20cwe-78
Published: Fri Feb 06 2026 (02/06/2026, 17:52:59 UTC)
Source: CVE Database V5
Vendor/Project: anthropics
Product: claude-code

Description

Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55.

AI-Powered Analysis

AILast updated: 02/06/2026, 18:29:46 UTC

Technical Analysis

CVE-2026-25723 is a vulnerability classified under CWE-20 (Improper Input Validation) and CWE-78 (Improper Neutralization of Special Elements used in an OS Command) affecting anthropics' Claude Code, an agentic coding tool designed to assist in automated code generation and editing. Prior to version 2.0.55, Claude Code failed to properly validate commands that involved piped sed operations combined with the echo command. This improper validation allowed an attacker who could execute commands via the "accept edits" feature to bypass file write restrictions, effectively enabling writes to sensitive directories such as the .claude folder and other paths outside the intended project scope. This bypass could be leveraged to modify or inject malicious files, potentially compromising the integrity and confidentiality of the development environment or enabling further attacks. The vulnerability does not require prior authentication but does require the attacker to have the ability to execute commands through the tool’s editing acceptance feature, which implies some level of user interaction or prior access. The CVSS 4.0 score of 7.7 (high severity) reflects the network attack vector, low attack complexity, partial attack prerequisites, and high impact on confidentiality, integrity, and availability. The issue was publicly disclosed on February 6, 2026, and has been addressed in version 2.0.55 of Claude Code. No known exploits have been reported in the wild, but the potential for abuse exists in environments where the tool is used with the vulnerable versions.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for software development teams relying on Claude Code for automated coding assistance. Unauthorized writes to sensitive directories could lead to the insertion of malicious code, backdoors, or tampering with configuration files, potentially compromising the entire software supply chain or development lifecycle. This could result in intellectual property theft, disruption of development processes, or introduction of vulnerabilities into production code. Organizations in sectors with high regulatory requirements such as finance, healthcare, and critical infrastructure could face compliance violations and reputational damage if exploited. Furthermore, the ability to write outside the project scope increases the risk of lateral movement within internal networks, potentially escalating the attack impact beyond the initial compromise. Given the network-based attack vector and ease of exploitation once command execution is possible, the threat is particularly relevant for collaborative environments or cloud-based development platforms where multiple users interact with the tool.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade all instances of Claude Code to version 2.0.55 or later, where the input validation flaw has been patched. Additionally, organizations should restrict the use of the "accept edits" feature to trusted users only and implement strict access controls to limit who can execute commands through Claude Code. Monitoring and logging command execution activities within the tool can help detect suspicious behavior early. Employing application whitelisting and sandboxing techniques around the development environment can reduce the risk of unauthorized file writes affecting critical system areas. Regularly auditing the .claude folder and other sensitive directories for unauthorized changes can help identify exploitation attempts. Finally, integrating secure coding and code review practices to detect anomalous code changes introduced via automated tools will further reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T16:48:00.426Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69862fadf9fa50a62f2569b5

Added to database: 2/6/2026, 6:15:09 PM

Last enriched: 2/6/2026, 6:29:46 PM

Last updated: 2/6/2026, 8:23:24 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats