EXECUTIVE SUMMARY:
A series of vulnerabilities in the Claude Code agentic coding tool allow untrusted or malicious input to undermine core security assumptions in the tool’s local execution environment. Multiple command‑injection and escape flaws can be leveraged to bypass sandbox protections and write restrictions: attackers who can inject untrusted content into a Claude Code context window may navigate into sensitive directories and bypass write protections to create or modify files, and improper validation of piped command can be used to evade file write restrictions and alter sensitive locations outside the intended project scope. Additionally, weaknesses in permission denial enforcement via symbolic links permit access to restricted files despite deny rules. Together these issues enable unauthorized modifications to local files and persistent configuration manipulation, posing a risk of unintended code execution and privilege escalation on systems where Claude Code is used without proper mitigation. Users should update to patched releases that correct directory validation, command validation, sandbox isolation, and symbolic link handling to mitigate these threats.
RECOMMENDATION:
We strongly recommend you update Claude Code to below version:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-66q4-vfjg-2qhh
https://github.com/advisories/GHSA-mhg7-666j-cqg4
https://github.com/advisories/GHSA-4q92-rfm6-2cqx
https://github.com/advisories/GHSA-ff64-7w26-62rf