CVE-2025-54795 – @anthropic-ai/claude-code
Package
Manager: npm
Name: @anthropic-ai/claude-code
Vulnerable Version: >=0 <1.0.20
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:U/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00167 pctl0.38288
Details
Claude Code echo command allowed bypass of user approval prompt for command execution Due to an error in command parsing, it was possible to bypass the Claude Code confirmation prompt to trigger execution of an untrusted command. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update. Thank you to Elad Beber (Cymulate) for reporting this issue!
Metadata
Created: 2025-08-04T15:18:03Z
Modified: 2025-08-05T17:10:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-x56v-x2h6-7j34/GHSA-x56v-x2h6-7j34.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-x56v-x2h6-7j34
Finding: F004
Auto approve: 1