CVE-2025-58764
📋 TL;DR
CVE-2025-58764 is a command injection vulnerability in Claude Code that allows bypassing the confirmation prompt to execute untrusted commands. This affects users of Claude Code versions prior to 1.0.105 who can add untrusted content to the context window. The vulnerability enables arbitrary command execution with the privileges of the Claude Code process.
💻 Affected Systems
- Claude Code
📦 What is this software?
Claude Code by Anthropic
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through arbitrary command execution, potentially leading to data theft, ransomware deployment, or complete system takeover.
Likely Case
Execution of malicious commands within the Claude Code environment, potentially leading to privilege escalation, data exfiltration, or lateral movement.
If Mitigated
Limited impact if proper input validation and sandboxing are in place, though command execution bypass remains possible.
🎯 Exploit Status
Exploitation requires ability to inject content into Claude Code context window. No public exploit code available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.105 or later
Vendor Advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-qxfv-fcpc-w36x
Restart Required: Yes
Instructions:
1. Check current Claude Code version
2. If version is earlier than 1.0.105, update to latest version
3. Restart Claude Code application
4. Verify update completed successfully
🔧 Temporary Workarounds
Disable Claude Code
allTemporarily disable Claude Code until patching can be completed
# Linux/macOS: Stop Claude Code process
# Windows: Use Task Manager to end Claude Code process
Restrict Context Window Input
allLimit what content can be added to Claude Code context window
🧯 If You Can't Patch
- Implement strict input validation for Claude Code context window content
- Run Claude Code with minimal privileges and in isolated environment
🔍 How to Verify
Check if Vulnerable:
Check Claude Code version - if earlier than 1.0.105, system is vulnerable
Check Version:
# Check Claude Code version in application settings or about dialog
Verify Fix Applied:
Confirm Claude Code version is 1.0.105 or later
📡 Detection & Monitoring
Log Indicators:
- Unexpected command execution patterns
- Failed confirmation prompt bypass attempts
- Unusual process spawning from Claude Code
Network Indicators:
- Unexpected outbound connections from Claude Code process
- Command and control traffic patterns
SIEM Query:
process_name:"claude-code" AND (command_execution OR suspicious_child_process)