Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mhg7-666j-cqg4 | Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55. | |
| Title | Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions | |
| Weaknesses | CWE-20 CWE-78 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-06T18:40:54.158Z
Reserved: 2026-02-05T16:48:00.426Z
Link: CVE-2026-25723
Updated: 2026-02-06T18:40:49.688Z
Status : Awaiting Analysis
Published: 2026-02-06T18:15:59.237
Modified: 2026-02-06T21:57:22.450
Link: CVE-2026-25723
No data.
OpenCVE Enrichment
No data.
Github GHSA