PT-2026-30707 · Anthropic · Claude Agent Sdk+1
Francesco Cipollone
·
Published
2026-04-06
·
Updated
2026-04-06
·
CVE-2026-35021
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Anthropic Claude Code CLI and Claude Agent SDK (affected versions not specified)
Description
The Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection issue in the prompt editor invocation utility. Attackers can execute arbitrary commands by crafting malicious file paths containing shell metacharacters such as
$() or backtick expressions. Even when file paths are enclosed in double quotes, POSIX shell semantics allow command substitution within those quotes, leading to arbitrary command execution with the privileges of the user running the CLI. The vulnerability is present because the file path is interpolated into shell commands executed via execSync.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Claude Agent Sdk
Claude Code Cli