CVE-2025-55284 – @anthropic-ai/claude-code
Package
Manager: npm
Name: @anthropic-ai/claude-code
Vulnerable Version: >=0 <1.0.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:U/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00062 pctl0.19559
Details
Claude Code's Permissive Default Allowlist Enables Unauthorized File Read and Network Exfiltration in Claude Code Due to an overly broad allowlist of safe commands, it was possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update. Thank you to https://hackerone.com/wunderwuzzi23 for reporting this issue!
Metadata
Created: 2025-08-18T18:46:52Z
Modified: 2025-08-18T18:46:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-x5gv-jw7f-j6xj/GHSA-x5gv-jw7f-j6xj.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-x5gv-jw7f-j6xj
Finding: F004
Auto approve: 1