Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Anthropics
Anthropics claude Code |
|
Vendors & Products |
Anthropics
Anthropics claude Code |
Mon, 18 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 16 Aug 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe commands. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update. | |
Title | Claude Code's Permissive Default Allowlist Enables Unauthorized File Read and Network Exfiltration in Claude Code | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-18T14:00:40.976Z
Reserved: 2025-08-12T16:15:30.236Z
Link: CVE-2025-55284

Updated: 2025-08-18T14:00:37.860Z

Status : Awaiting Analysis
Published: 2025-08-16T02:15:24.637
Modified: 2025-08-18T20:16:28.750
Link: CVE-2025-55284

No data.

Updated: 2025-08-18T20:59:28Z