CVE-2025-55284

7.5 HIGH

📋 TL;DR

CVE-2025-55284 allows attackers to bypass Claude Code's confirmation prompts to read local files and exfiltrate their contents over the network without user consent. This occurs due to an overly permissive allowlist of 'safe' commands. Only users of Claude Code versions prior to 1.0.4 who can inject untrusted content into the context window are affected.

💻 Affected Systems

Products:
  • Claude Code
Versions: All versions prior to 1.0.4
Operating Systems: All platforms running Claude Code
Default Config Vulnerable: ⚠️ Yes
Notes: Versions prior to 1.0.24 are deprecated and have been forced to update. Standard auto-update users received the fix automatically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive local files (including credentials, configuration files, private keys) followed by exfiltration to attacker-controlled servers.

🟠

Likely Case

Limited file read of accessible user documents followed by data exfiltration, potentially exposing PII or proprietary information.

🟢

If Mitigated

No impact if proper input validation prevents untrusted content injection into Claude Code context windows.

🌐 Internet-Facing: LOW - Exploitation requires ability to inject content into the Claude Code context window, which typically requires local or authenticated access.
🏢 Internal Only: MEDIUM - Internal users with ability to inject untrusted content into Claude Code sessions could exploit this to read and exfiltrate files accessible to the Claude Code process.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to add untrusted content into a Claude Code context window, which typically requires some level of access or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4

Vendor Advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-x5gv-jw7f-j6xj

Restart Required: Yes

Instructions:

1. Ensure Claude Code auto-update is enabled
2. Restart Claude Code to apply version 1.0.4 or later
3. Verify version is 1.0.4+ using Help > About or version command

🔧 Temporary Workarounds

Disable Claude Code or restrict usage

all

Temporarily disable Claude Code or restrict its usage to trusted environments only

Implement strict input validation

all

Ensure no untrusted content can be injected into Claude Code context windows

🧯 If You Can't Patch

  • Restrict Claude Code to run in isolated environments with limited file system access
  • Implement network egress filtering to block unauthorized data exfiltration

🔍 How to Verify

Check if Vulnerable:

Check Claude Code version - if version is less than 1.0.4, system is vulnerable

Check Version:

Check via Claude Code interface: Help > About or use platform-specific package manager commands

Verify Fix Applied:

Confirm Claude Code version is 1.0.4 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual file read operations by Claude Code process
  • Multiple confirmation prompt bypass attempts

Network Indicators:

  • Unexpected outbound network connections from Claude Code process to unknown destinations
  • Large data transfers from Claude Code to external IPs

SIEM Query:

Process:claude-code AND (EventID:4663 OR DestinationPort:443,80) AND DataTransfer > 1MB

🔗 References

📤 Share & Export