CVE-2026-35603: CWE-426: Untrusted Search Path in anthropics claude-code
Claude Code is an agentic coding tool. In versions prior to 2.1.75 on Windows, Claude Code loaded the system-wide default configuration from C:\ProgramData\ClaudeCode\managed-settings.json without validating directory ownership or access permissions. Because the ProgramData directory is writable by non-administrative users by default and the ClaudeCode subdirectory was not pre-created or access-restricted, a low-privileged local user could create this directory and place a malicious configuration file that would be automatically loaded for any user launching Claude Code on the same machine. Exploiting this would have required a shared multi-user Windows system and a victim user to launch Claude Code after the malicious configuration was placed. This issue has been fixed on version 2.1.75.
AI Analysis
Technical Summary
Anthropics claude-code before version 2.1.75 on Windows suffers from an untrusted search path vulnerability (CWE-426). The application loads its system-wide default configuration from C:\ProgramData\ClaudeCode\managed-settings.json without verifying directory ownership or access permissions. Since the ProgramData directory is writable by non-administrative users by default and the ClaudeCode subdirectory was not pre-created or access-restricted, a low-privileged local user could create this directory and place a malicious configuration file. When any user launches Claude Code, the malicious configuration would be loaded, potentially allowing code execution or privilege escalation. This vulnerability affects shared multi-user Windows environments and requires user interaction to launch the vulnerable application. The issue is resolved in version 2.1.75.
Potential Impact
A low-privileged local user on a shared Windows system can place a malicious configuration file that will be loaded by any user launching Claude Code, potentially leading to unauthorized code execution or privilege escalation. The vulnerability requires a victim user to launch the application after the malicious file is placed. There are no known exploits in the wild. The CVSS 4.0 base score is 5.4, indicating medium severity.
Mitigation Recommendations
This vulnerability has been fixed in anthropics claude-code version 2.1.75. Users should upgrade to version 2.1.75 or later to remediate this issue. Since the vulnerability requires a shared multi-user Windows environment and local user access, restricting write permissions to the ProgramData\ClaudeCode directory and ensuring it is pre-created with proper access controls can serve as a temporary mitigation. Patch status is not explicitly stated beyond the fix in version 2.1.75; verify with the vendor for official advisories.
CVE-2026-35603: CWE-426: Untrusted Search Path in anthropics claude-code
Description
Claude Code is an agentic coding tool. In versions prior to 2.1.75 on Windows, Claude Code loaded the system-wide default configuration from C:\ProgramData\ClaudeCode\managed-settings.json without validating directory ownership or access permissions. Because the ProgramData directory is writable by non-administrative users by default and the ClaudeCode subdirectory was not pre-created or access-restricted, a low-privileged local user could create this directory and place a malicious configuration file that would be automatically loaded for any user launching Claude Code on the same machine. Exploiting this would have required a shared multi-user Windows system and a victim user to launch Claude Code after the malicious configuration was placed. This issue has been fixed on version 2.1.75.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Anthropics claude-code before version 2.1.75 on Windows suffers from an untrusted search path vulnerability (CWE-426). The application loads its system-wide default configuration from C:\ProgramData\ClaudeCode\managed-settings.json without verifying directory ownership or access permissions. Since the ProgramData directory is writable by non-administrative users by default and the ClaudeCode subdirectory was not pre-created or access-restricted, a low-privileged local user could create this directory and place a malicious configuration file. When any user launches Claude Code, the malicious configuration would be loaded, potentially allowing code execution or privilege escalation. This vulnerability affects shared multi-user Windows environments and requires user interaction to launch the vulnerable application. The issue is resolved in version 2.1.75.
Potential Impact
A low-privileged local user on a shared Windows system can place a malicious configuration file that will be loaded by any user launching Claude Code, potentially leading to unauthorized code execution or privilege escalation. The vulnerability requires a victim user to launch the application after the malicious file is placed. There are no known exploits in the wild. The CVSS 4.0 base score is 5.4, indicating medium severity.
Mitigation Recommendations
This vulnerability has been fixed in anthropics claude-code version 2.1.75. Users should upgrade to version 2.1.75 or later to remediate this issue. Since the vulnerability requires a shared multi-user Windows environment and local user access, restricting write permissions to the ProgramData\ClaudeCode directory and ensuring it is pre-created with proper access controls can serve as a temporary mitigation. Patch status is not explicitly stated beyond the fix in version 2.1.75; verify with the vendor for official advisories.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-03T21:25:12.162Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e29db8bdfbbecc598ee1bc
Added to database: 4/17/2026, 8:53:12 PM
Last enriched: 4/17/2026, 9:08:30 PM
Last updated: 4/21/2026, 2:01:28 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.