PT-2025-40458 · Anthropic · Claude-Code

Avivdon

·

Published

2025-10-03

·

Updated

2026-03-31

·

CVE-2025-59536

CVSS v3.1

8.8

High

AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Claude Code versions prior to 1.0.111
Description Claude Code, an agentic coding tool, had a flaw in its startup trust dialog implementation. This allowed the tool to execute code from a project before the user confirmed the trust dialog. To exploit this, a user needed to launch Claude Code within an untrusted directory. Real-world incidents included the theft of a Gemini API key resulting in a loss of $82,000 within 48 hours, and the exfiltration of credentials via a Claude Code MCP configuration. The issue was addressed in version 1.0.111. Exploitation involved malicious configurations, specifically within .claude/settings.json files, utilizing command hooks to execute code upon cloning a repository. The vulnerability could lead to Remote Code Execution (RCE) and API token theft.
Recommendations Update Claude Code to version 1.0.111 or later.

Exploit

Fix

RCE

Code Injection

Weakness Enumeration

Related Identifiers

CVE-2025-59536
GHSA-4FGQ-FPQ9-MR3G

Affected Products

Claude-Code